语言:
https://security-tracker.debian.org/tracker/source-package/gtkwave
https://security-tracker.debian.org/tracker/CVE-2023-32650
https://security-tracker.debian.org/tracker/CVE-2023-34087
https://security-tracker.debian.org/tracker/CVE-2023-34436
https://security-tracker.debian.org/tracker/CVE-2023-35004
https://security-tracker.debian.org/tracker/CVE-2023-35057
https://security-tracker.debian.org/tracker/CVE-2023-35128
https://security-tracker.debian.org/tracker/CVE-2023-35702
https://security-tracker.debian.org/tracker/CVE-2023-35703
https://security-tracker.debian.org/tracker/CVE-2023-35704
https://security-tracker.debian.org/tracker/CVE-2023-35955
https://security-tracker.debian.org/tracker/CVE-2023-35956
https://security-tracker.debian.org/tracker/CVE-2023-35957
https://security-tracker.debian.org/tracker/CVE-2023-35958
https://security-tracker.debian.org/tracker/CVE-2023-35959
https://security-tracker.debian.org/tracker/CVE-2023-35960
https://security-tracker.debian.org/tracker/CVE-2023-35961
https://security-tracker.debian.org/tracker/CVE-2023-35962
https://security-tracker.debian.org/tracker/CVE-2023-35963
https://security-tracker.debian.org/tracker/CVE-2023-35964
https://security-tracker.debian.org/tracker/CVE-2023-35969
https://security-tracker.debian.org/tracker/CVE-2023-35970
https://security-tracker.debian.org/tracker/CVE-2023-35989
https://security-tracker.debian.org/tracker/CVE-2023-35992
https://security-tracker.debian.org/tracker/CVE-2023-35994
https://security-tracker.debian.org/tracker/CVE-2023-35995
https://security-tracker.debian.org/tracker/CVE-2023-35996
https://security-tracker.debian.org/tracker/CVE-2023-35997
https://security-tracker.debian.org/tracker/CVE-2023-36746
https://security-tracker.debian.org/tracker/CVE-2023-36747
https://security-tracker.debian.org/tracker/CVE-2023-36861
https://security-tracker.debian.org/tracker/CVE-2023-36864
https://security-tracker.debian.org/tracker/CVE-2023-36915
https://security-tracker.debian.org/tracker/CVE-2023-36916
https://security-tracker.debian.org/tracker/CVE-2023-37282
https://security-tracker.debian.org/tracker/CVE-2023-37416
https://security-tracker.debian.org/tracker/CVE-2023-37417
https://security-tracker.debian.org/tracker/CVE-2023-37418
https://security-tracker.debian.org/tracker/CVE-2023-37419
https://security-tracker.debian.org/tracker/CVE-2023-37420
https://security-tracker.debian.org/tracker/CVE-2023-37442
https://security-tracker.debian.org/tracker/CVE-2023-37443
https://security-tracker.debian.org/tracker/CVE-2023-37444
https://security-tracker.debian.org/tracker/CVE-2023-37445
https://security-tracker.debian.org/tracker/CVE-2023-37446
https://security-tracker.debian.org/tracker/CVE-2023-37447
https://security-tracker.debian.org/tracker/CVE-2023-37573
https://security-tracker.debian.org/tracker/CVE-2023-37574
https://security-tracker.debian.org/tracker/CVE-2023-37575
https://security-tracker.debian.org/tracker/CVE-2023-37576
https://security-tracker.debian.org/tracker/CVE-2023-37577
https://security-tracker.debian.org/tracker/CVE-2023-37578
https://security-tracker.debian.org/tracker/CVE-2023-37921
https://security-tracker.debian.org/tracker/CVE-2023-37922
https://security-tracker.debian.org/tracker/CVE-2023-37923
https://security-tracker.debian.org/tracker/CVE-2023-38583
https://security-tracker.debian.org/tracker/CVE-2023-38618
https://security-tracker.debian.org/tracker/CVE-2023-38619
https://security-tracker.debian.org/tracker/CVE-2023-38620
https://security-tracker.debian.org/tracker/CVE-2023-38621
https://security-tracker.debian.org/tracker/CVE-2023-38622
https://security-tracker.debian.org/tracker/CVE-2023-38623
https://security-tracker.debian.org/tracker/CVE-2023-38648
https://security-tracker.debian.org/tracker/CVE-2023-38649
https://security-tracker.debian.org/tracker/CVE-2023-38650
https://security-tracker.debian.org/tracker/CVE-2023-38651
https://security-tracker.debian.org/tracker/CVE-2023-38652
https://security-tracker.debian.org/tracker/CVE-2023-38653
https://security-tracker.debian.org/tracker/CVE-2023-38657
https://security-tracker.debian.org/tracker/CVE-2023-39234
https://security-tracker.debian.org/tracker/CVE-2023-39235
https://security-tracker.debian.org/tracker/CVE-2023-39270
https://security-tracker.debian.org/tracker/CVE-2023-39271
https://security-tracker.debian.org/tracker/CVE-2023-39272
https://security-tracker.debian.org/tracker/CVE-2023-39273
https://security-tracker.debian.org/tracker/CVE-2023-39274
https://security-tracker.debian.org/tracker/CVE-2023-39275
https://security-tracker.debian.org/tracker/CVE-2023-39316
https://security-tracker.debian.org/tracker/CVE-2023-39317
https://security-tracker.debian.org/tracker/CVE-2023-39413
https://security-tracker.debian.org/tracker/CVE-2023-39414
https://security-tracker.debian.org/tracker/CVE-2023-39443
https://security-tracker.debian.org/tracker/CVE-2023-39444
严重性: High
ID: 192900
文件名: debian_DSA-5653.nasl
版本: 1.1
类型: local
代理: unix
发布时间: 2024/4/3
最近更新时间: 2024/4/4
支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
风险因素: Medium
分数: 6.7
风险因素: High
基本分数: 7.2
时间分数: 5.6
矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2023-39444
风险因素: High
基本分数: 7.8
时间分数: 7
矢量: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:gtkwave, cpe:/o:debian:debian_linux:12.0
必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可利用: true
易利用性: Exploits are available
补丁发布日期: 2024/4/3
漏洞发布日期: 2024/1/8
CVE: CVE-2023-32650, CVE-2023-34087, CVE-2023-34436, CVE-2023-35004, CVE-2023-35057, CVE-2023-35128, CVE-2023-35702, CVE-2023-35703, CVE-2023-35704, CVE-2023-35955, CVE-2023-35956, CVE-2023-35957, CVE-2023-35958, CVE-2023-35959, CVE-2023-35960, CVE-2023-35961, CVE-2023-35962, CVE-2023-35963, CVE-2023-35964, CVE-2023-35969, CVE-2023-35970, CVE-2023-35989, CVE-2023-35992, CVE-2023-35994, CVE-2023-35995, CVE-2023-35996, CVE-2023-35997, CVE-2023-36746, CVE-2023-36747, CVE-2023-36861, CVE-2023-36864, CVE-2023-36915, CVE-2023-36916, CVE-2023-37282, CVE-2023-37416, CVE-2023-37417, CVE-2023-37418, CVE-2023-37419, CVE-2023-37420, CVE-2023-37442, CVE-2023-37443, CVE-2023-37444, CVE-2023-37445, CVE-2023-37446, CVE-2023-37447, CVE-2023-37573, CVE-2023-37574, CVE-2023-37575, CVE-2023-37576, CVE-2023-37577, CVE-2023-37578, CVE-2023-37921, CVE-2023-37922, CVE-2023-37923, CVE-2023-38583, CVE-2023-38618, CVE-2023-38619, CVE-2023-38620, CVE-2023-38621, CVE-2023-38622, CVE-2023-38623, CVE-2023-38648, CVE-2023-38649, CVE-2023-38650, CVE-2023-38651, CVE-2023-38652, CVE-2023-38653, CVE-2023-38657, CVE-2023-39234, CVE-2023-39235, CVE-2023-39270, CVE-2023-39271, CVE-2023-39272, CVE-2023-39273, CVE-2023-39274, CVE-2023-39275, CVE-2023-39316, CVE-2023-39317, CVE-2023-39413, CVE-2023-39414, CVE-2023-39443, CVE-2023-39444