ag九游会官方登录--Home

漏扫/基线晋级包

csv_vul_plugins_202203

泉源:ag九游会网络    公布工夫:###nbsp;   欣赏次数:
 

晋级包下载:


【增长插件概况】
1、本次月度晋级包次要新增为漏扫插件,数目为17613条

【影响范畴】
1、该晋级包能在公布的Pro.2020.07.01.004855之后的任何版本上晋级
2、晋级乐成后底子库稳定,
毛病库晋级后:Vul.2022.03.08.004050
基线库晋级后:Scb.2022.03.08.004050
3、晋级完毕后,呆板不会重启

毛病局部列表:
('CVE-2009-4495', '现在厂商还没有提供补丁大概晋级步伐,发起利用此软件的用户随时存眷厂商的主页以获取最新版本: http://yaws.hyber.org/')
('CVE-2010-1268', '现在厂商还没有提供此毛病的相干补丁大概晋级步伐,发起利用此软件的用户随时存眷厂商的主页以获取最新版本: http://fh54.de/2009/09/justvisual2/')
('CVE-2010-1266', '现在厂商还没有提供此毛病的相干补丁大概晋级步伐,发起利用此软件的用户随时存眷厂商的主页以获取最新版本: http://code.google.com/p/webmaidcms/')
('CVE-2010-1639', '现在厂商曾经公布了晋级补丁以修复这个宁静题目,补丁下载链接: http://git.clamav.net/gitweb?p=clamav-devel.git;a=commitdiff;h=f0eb394501ec21b9fe67f36cbf5db788711d4236')
('CVE-2010-1640', '现在厂商曾经公布了晋级补丁以修复这个宁静题目,补丁下载链接: Ubuntu Ubuntu Linux 9.10 sparc Ubuntu clamav-testfiles_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb http://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-testfi les_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb Ubuntu clamav-milter_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.95.3+df sg-1ubuntu0.09.10.2_sparc.deb Ubuntu clamav-freshclam_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.95.3+dfs g-1ubuntu0.09.10.2_sparc.deb Ubuntu clamav-daemon_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.95.3+dfsg-1 ubuntu0.09.10.2_sparc.deb Ubuntu libclamav6_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.95.3+dfsg-1ubu ntu0.09.10.2_sparc.deb Ubuntu clamav_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav_0.95.3+dfsg-1ubuntu0 .09.10.2_sparc.deb Ubuntu libclamav-dev_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.95.3+dfsg-1 ubuntu0.09.10.2_sparc.deb Ubuntu clamav-dbg_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.95.3+dfsg-1ubu ntu0.09.10.2_sparc.deb Ubuntu clamav-base_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb http://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-base_0.95. 3+dfsg-1ubuntu0.09.10.2_all.deb Ubuntu clamav-docs_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb http://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-docs_0.95. 3+dfsg-1ubuntu0.09.10.2_all.deb')
('CVE-2010-2849', '现在厂商还没有提供此毛病的相干补丁大概晋级步伐,发起利用此软件的用户随时存眷厂商的主页以获取最新版本: http://www.nubuilder.com/nubuilderwww/')
('CVE-2008-5949', '现在厂商还没有提供补丁大概晋级步伐,发起利用此软件的用户随时存眷厂商的主页以获取最新版本: http://tiddlywiki.org/')
('CVE-2010-3434', '现在厂商曾经公布了晋级补丁以修复此宁静题目,补丁获取链接: http://www.clamav.net/lang/fr/download/sources/')
('CVE-2011-4862', '现在厂商曾经公布了晋级补丁以修复此宁静题目,补丁获取链接: http://www.freebsd.org/releases/7.3R/announce.html')
('CVE-1999-1484, CVE-2002-0228, CVE-2002-0472', 'CVE-1999-1484:现在,SecurityFocus职员不晓得有任何供给商为此题目提供了补丁.假如您以为ag九游会的错误或理解更多最新的信息,请发送邮件至:>###.\nCVE-2002-0228:现在SecurityFocus职员不晓得有任何供给商提供的补丁.假如您以为ag九游会搞错了或理解到更多的最新信息,请发送邮件至:>### <mailto:>###>.\nCVE-2002-0472:现在,SecurityFocus职员不晓得有任何供给商为此题目提供的补丁.假如你f')
('CVE-2016-9263, CVE-2017-1000600', 'CVE-2016-9263:现在厂商暂未公布修复步伐办理此宁静题目,发起利用此软件的用户随时存眷厂商主页或参考网址以获取办理措施: https://wordpress.org/\nCVE-2017-1000600:现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://wordpress.com/')
('CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-40438', 'CVE-2021-34798:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: httpd.apache.org/security/vulnerabilities_24.html\nCVE-2021-36160:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E\nCVE-2021-39275:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://httpd.apache.org/security/vulnerabilities_24.html\nCVE-2021-40438:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://access.redhat.com/security/cve/cve-2021-40438')
('CVE-2022-23181', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.75')
('CVE-2022-23181', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.75')
('CVE-2022-21371', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.oracle.com/security-alerts/cpujan2022.html')
('CVE-2021-45105', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd')
('CVE-2021-44832', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf')
('CVE-2019-17571, CVE-2020-9488, CVE-2020-9493, CVE-2021-4104, CVE-2022-23302,\n\n                CVE-2022-23305, CVE-2022-23307', 'CVE-2019-17571:现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://www.apache.org/\nCVE-2020-9488:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://issues.apache.org/jira/browse/LOG4J2-2819\nCVE-2020-9493:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.apache.org/thread.html/r50d389c613ba6062a26aa57e163c09bfee4ff2d95d67331d75265b83@%3Cannounce.apache.org%3E\nCVE-2021-4104:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://logging.apache.org/log4j/2.x/security.html\nCVE-2022-23302:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w\nCVE-2022-23305:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y\nCVE-2022-23307:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh')
('CVE-2021-44228, CVE-2021-45046', 'CVE-2021-44228:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://logging.apache.org/log4j/2.x/security.html\nCVE-2021-45046:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://logging.apache.org/log4j/2.x/security.html.')
('CVE-2021-32037', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mongodb.org/browse/SERVER-59071')
('CVE-2021-32037', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mongodb.org/browse/SERVER-59071')
('CVE-2022-23707', '更新至7.17.0或更新版本.')
('CVE-2021-44141, CVE-2021-44142, CVE-2022-0336', 'CVE-2021-44141:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://access.redhat.com/security/cve/cve-2021-44141\nCVE-2021-44142:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.samba.org/samba/security/CVE-2021-44142.html\nCVE-2022-0336:现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.10.1')
('CVE-2022-0633', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3')
('CVE-2022-24947, CVE-2022-24948', 'CVE-2022-24947:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c\nCVE-2022-24948:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b')
('CVE-2021-4191', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: http://about.gitlab.com/releases/2022/02/25/critical-security-release-gitlab-14-8-2-released/')
('CVE-2021-45326', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/go-gitea/gitea')
('CVE-2021-45328', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/go-gitea/gitea')
('CVE-2021-45327', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/go-gitea/gitea')
('CVE-2021-45325', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/go-gitea/gitea')
('CVE-2021-45330', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://github.com/go-gitea/gitea/issues/4336')
('CVE-2021-45331', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/')
('CVE-2021-45329', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/go-gitea/gitea')
('CVE-2022-23616', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mgjw-2wrp-r535')
('CVE-2022-23618', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv')
('CVE-2022-23617', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gf7x-2j2x-7f73')
('CVE-2022-23619', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f')
('CVE-2022-23620', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq')
('CVE-2022-23622', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr')
('CVE-2022-23621', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j')
('CVE-2022-23615', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r')
('CVE-2020-25717, CVE-2020-21913, CVE-2022-22991, CVE-2022-22989,\n\n                CVE-2022-22990', 'CVE-2020-25717:现在厂商暂未公布修复步伐办理此宁静题目,发起利用此软件的用户随时存眷厂商主页或参考网址以获取办理措施: https://vigilance.fr/vulnerability/Samba-multiple-vulnerabilities-36843\nCVE-2020-21913:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://unicode-org.atlassian.net/browse/ICU-20850\nCVE-2022-22991, CVE-2022-22989, CVE-2022-22990:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117')
('CVE-2021-44736', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://support.lexmark.com/alerts/')
('CVE-2022-0332', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://moodle.org/mod/forum/discuss.php?d=431099&parent=1734813')
('CVE-2022-0333, CVE-2022-0334, CVE-2022-0335', 'CVE-2022-0333:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://moodle.org/mod/forum/discuss.php?d=431100&parent=1734814\nCVE-2022-0334:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://moodle.org/mod/forum/discuss.php?d=431102&parent=1734816\nCVE-2022-0335:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://moodle.org/mod/forum/discuss.php?d=431103')
('CVE-2021-24423', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://wpscan.com/vulnerability/541974d6-2df8-4497-9aee-afd3b9024102')
('CVE-2021-25022', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://wpscan.com/vulnerability/1801c7ae-2b5c-493f-969d-4bb19a9feb15')
('CVE-2021-24985', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://wpscan.com/vulnerability/50be0ebf-fe6d-41e5-8af9-0d74f33aeb57')
('CVE-2021-25008', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://wpscan.com/vulnerability/cb232354-f74d-48bb-b437-7bdddd1df42a')
('CVE-2021-25074', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164')
('CVE-2022-23807', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.phpmyadmin.net/security/PMASA-2022-1/')
('CVE-2022-23807', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.phpmyadmin.net/security/PMASA-2022-1/')
('CVE-2022-23808', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.phpmyadmin.net/security/PMASA-2022-2/')
('CVE-2022-23808', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.phpmyadmin.net/security/PMASA-2022-2/')
('CVE-2021-44118, CVE-2021-44120, CVE-2021-44122, CVE-2021-44123', 'CVE-2021-44118:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://git.spip.net/spip/medias/commit/13c293fabd35e2c152379522c29432423936cbba\nCVE-2021-44120:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81\nCVE-2021-44122:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://git.spip.net/spip/spip/commit/1b8e4f404c2441c15ca6540b9a6d8e50cff219db\nCVE-2021-44123:现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://git.spip.net/spip/spip/commit/1cf91def15966406ddd0488cf9d1ecd1ae82d47a')
('CVE-2021-4160', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f')
('CVE-2021-4160', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f')
('CVE-2021-46657', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mariadb.org/browse/MDEV-25629')
('CVE-2021-46657', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mariadb.org/browse/MDEV-25629')
('CVE-2021-46659', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mariadb.org/browse/MDEV-25631')
('CVE-2021-46659', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mariadb.org/browse/MDEV-25631')
('CVE-2021-46658', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mariadb.org/browse/MDEV-25630')
('CVE-2021-46658', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://jira.mariadb.org/browse/MDEV-25630')
('CVE-2021-40033', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20220112-01-infodis-cn')
('CVE-2021-40042', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20220112-01-invalid-cn')
('CVE-2021-45079', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://lists.debian.org/debian-security-announce/2022/msg00022.html')
('CVE-2021-44142', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://www.samba.org/samba/security/CVE-2021-44142.html')
('CVE-2021-44141', '现在厂商已公布晋级补丁以修复毛病,补丁获取链接: https://access.redhat.com/security/cve/cve-2021-44141')
('CVE-2022-0336', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.10.1')
('CVE-2021-46661', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46661', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46662', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46662', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46663', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46663', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46664', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46664', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46665', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46665', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')
('CVE-2021-46666', '现在厂商已公布晋级补丁以修复毛病,概况请存眷厂商主页: https://mariadb.org/')


 
 

上一篇:尺度化更新-BDSEC_upgrade_package_2022-03

###

下一篇:###7699

###