语言:
https://security-tracker.debian.org/tracker/source-package/u-boot
https://security-tracker.debian.org/tracker/CVE-2019-14196
https://security-tracker.debian.org/tracker/CVE-2022-2347
https://security-tracker.debian.org/tracker/CVE-2022-30552
https://security-tracker.debian.org/tracker/CVE-2022-30767
https://security-tracker.debian.org/tracker/CVE-2022-30790
https://security-tracker.debian.org/tracker/CVE-2022-33103
https://security-tracker.debian.org/tracker/CVE-2022-33967
https://security-tracker.debian.org/tracker/CVE-2022-34835
https://security-tracker.debian.org/tracker/CVE-2024-57254
https://security-tracker.debian.org/tracker/CVE-2024-57255
https://security-tracker.debian.org/tracker/CVE-2024-57256
https://security-tracker.debian.org/tracker/CVE-2024-57257
https://security-tracker.debian.org/tracker/CVE-2024-57258
严重性: Critical
ID: 235044
文件名: debian_DLA-4150.nasl
版本: 1.3
类型: local
代理: unix
发布时间: 2025/5/1
最近更新时间: 2025/5/7
支持的传感器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
风险因素: High
分数: 7.3
风险因素: High
基本分数: 7.5
时间分数: 5.9
矢量: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 分数来源: CVE-2022-34835
风险因素: Critical
基本分数: 9.8
时间分数: 8.8
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:u-boot-tools, p-cpe:/a:debian:debian_linux:u-boot-omap, p-cpe:/a:debian:debian_linux:u-boot-amlogic, p-cpe:/a:debian:debian_linux:u-boot-sunxi, p-cpe:/a:debian:debian_linux:u-boot-qemu, p-cpe:/a:debian:debian_linux:u-boot-qcom, p-cpe:/a:debian:debian_linux:u-boot, p-cpe:/a:debian:debian_linux:u-boot-rpi, p-cpe:/a:debian:debian_linux:u-boot-mvebu, p-cpe:/a:debian:debian_linux:u-boot-rockchip, p-cpe:/a:debian:debian_linux:u-boot-exynos, p-cpe:/a:debian:debian_linux:u-boot-imx, p-cpe:/a:debian:debian_linux:u-boot-tegra
必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可利用: true
易利用性: Exploits are available
补丁发布日期: 2025/5/1
漏洞发布日期: 2019/7/31
CVE: CVE-2019-14196, CVE-2022-2347, CVE-2022-30552, CVE-2022-30767, CVE-2022-30790, CVE-2022-33103, CVE-2022-33967, CVE-2022-34835, CVE-2024-57254, CVE-2024-57255, CVE-2024-57256, CVE-2024-57257, CVE-2024-57258, CVE-2024-57259