语言:
https://security-tracker.debian.org/tracker/CVE-2016-5181
https://security-tracker.debian.org/tracker/CVE-2016-5182
https://security-tracker.debian.org/tracker/CVE-2016-5183
https://security-tracker.debian.org/tracker/CVE-2016-5184
https://security-tracker.debian.org/tracker/CVE-2016-5185
https://security-tracker.debian.org/tracker/CVE-2016-5186
https://security-tracker.debian.org/tracker/CVE-2016-5187
https://security-tracker.debian.org/tracker/CVE-2016-5188
https://security-tracker.debian.org/tracker/CVE-2016-5189
https://security-tracker.debian.org/tracker/CVE-2016-5190
https://security-tracker.debian.org/tracker/CVE-2016-5191
https://security-tracker.debian.org/tracker/CVE-2016-5192
https://security-tracker.debian.org/tracker/CVE-2016-5193
https://security-tracker.debian.org/tracker/CVE-2016-5194
https://security-tracker.debian.org/tracker/CVE-2016-5198
https://security-tracker.debian.org/tracker/CVE-2016-5199
https://security-tracker.debian.org/tracker/CVE-2016-5200
https://security-tracker.debian.org/tracker/CVE-2016-5201
https://security-tracker.debian.org/tracker/CVE-2016-5202
https://security-tracker.debian.org/tracker/CVE-2016-5203
https://security-tracker.debian.org/tracker/CVE-2016-5204
https://security-tracker.debian.org/tracker/CVE-2016-5205
https://security-tracker.debian.org/tracker/CVE-2016-5206
https://security-tracker.debian.org/tracker/CVE-2016-5207
https://security-tracker.debian.org/tracker/CVE-2016-5208
https://security-tracker.debian.org/tracker/CVE-2016-5209
https://security-tracker.debian.org/tracker/CVE-2016-5210
https://security-tracker.debian.org/tracker/CVE-2016-5211
https://security-tracker.debian.org/tracker/CVE-2016-5212
https://security-tracker.debian.org/tracker/CVE-2016-5213
https://security-tracker.debian.org/tracker/CVE-2016-5214
https://security-tracker.debian.org/tracker/CVE-2016-5215
https://security-tracker.debian.org/tracker/CVE-2016-5216
https://security-tracker.debian.org/tracker/CVE-2016-5217
https://security-tracker.debian.org/tracker/CVE-2016-5218
https://security-tracker.debian.org/tracker/CVE-2016-5219
https://security-tracker.debian.org/tracker/CVE-2016-5220
https://security-tracker.debian.org/tracker/CVE-2016-5221
https://security-tracker.debian.org/tracker/CVE-2016-5222
https://security-tracker.debian.org/tracker/CVE-2016-5223
https://security-tracker.debian.org/tracker/CVE-2016-5224
https://security-tracker.debian.org/tracker/CVE-2016-5225
https://security-tracker.debian.org/tracker/CVE-2016-5226
https://security-tracker.debian.org/tracker/CVE-2016-9650
https://security-tracker.debian.org/tracker/CVE-2016-9651
https://security-tracker.debian.org/tracker/CVE-2016-9652
严重性: Critical
ID: 95667
文件名: debian_DSA-3731.nasl
版本: 3.20
类型: local
代理: unix
发布时间: 2016/12/12
最近更新时间: 2022/6/8
支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: High
分数: 8.9
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
风险因素: Critical
基本分数: 9.8
时间分数: 9.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:debian:debian_linux:8.0, p-cpe:/a:debian:debian_linux:chromium-browser
必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可利用: true
易利用性: Exploits are available
补丁发布日期: 2016/12/11
漏洞发布日期: 2016/12/18
CISA 已知可遭利用的漏洞到期日期: 2022/6/22
CVE: CVE-2016-5181, CVE-2016-5182, CVE-2016-5183, CVE-2016-5184, CVE-2016-5185, CVE-2016-5186, CVE-2016-5187, CVE-2016-5188, CVE-2016-5189, CVE-2016-5190, CVE-2016-5191, CVE-2016-5192, CVE-2016-5193, CVE-2016-5194, CVE-2016-5198, CVE-2016-5199, CVE-2016-5200, CVE-2016-5201, CVE-2016-5202, CVE-2016-5203, CVE-2016-5204, CVE-2016-5205, CVE-2016-5206, CVE-2016-5207, CVE-2016-5208, CVE-2016-5209, CVE-2016-5210, CVE-2016-5211, CVE-2016-5212, CVE-2016-5213, CVE-2016-5214, CVE-2016-5215, CVE-2016-5216, CVE-2016-5217, CVE-2016-5218, CVE-2016-5219, CVE-2016-5220, CVE-2016-5221, CVE-2016-5222, CVE-2016-5223, CVE-2016-5224, CVE-2016-5225, CVE-2016-5226, CVE-2016-9650, CVE-2016-9651, CVE-2016-9652
DSA: 3731