\n\t
Peak Memory Use<\/strong> 3.95 MB<\/p>\t<\/div>\n\n\tMessage<\/th> | Memory use<\/th><\/tr> |
---|
Component initialization<\/td> | 1.41 MB<\/td><\/tr><\/table><\/div>\n\n\n\t Timers<\/h2>\n\t\n\t\t\t\t Total Request Time:<\/strong> 411 (ms)<\/p>\t<\/div>\nMessage<\/th> | Time in ms<\/th> | Graph<\/th><\/tr> |
---|
Core Processing (Derived from $_SERVER[\"REQUEST_TIME\"])<\/td> | 4.62<\/td> | <\/div><\/div><\/td><\/tr>\n Event: Controller.initialize<\/td> | 0.02<\/td> | <\/div><\/div><\/td><\/tr>\n Event: Controller.startup<\/td> | 0.07<\/td> | <\/div><\/div><\/td><\/tr>\n Controller action<\/td> | 388.25<\/td> | <\/div><\/div><\/td><\/tr>\n Event: Controller.beforeRender<\/td> | 4.64<\/td> | <\/div><\/div><\/td><\/tr>\n » Processing toolbar data<\/td> | 4.55<\/td> | <\/div><\/div><\/td><\/tr>\n Rendering View<\/td> | 8.53<\/td> | <\/div><\/div><\/td><\/tr>\n » Event: View.beforeRender<\/td> | 0.03<\/td> | <\/div><\/div><\/td><\/tr>\n » Rendering APP\/View\/Jvninfos\/index.ctp<\/td> | 7.00<\/td> | <\/div><\/div><\/td><\/tr>\n » Event: View.afterRender<\/td> | 0.02<\/td> | <\/div><\/div><\/td><\/tr>\n » Event: View.beforeLayout<\/td> | 0.02<\/td> | <\/div><\/div><\/td><\/tr>\n » Rendering APP\/View\/Layouts\/default.ctp<\/td> | 0.97<\/td> | <\/div><\/div><\/td><\/tr>\n » » Rendering CORE\/Cake\/View\/Elements\/sql_dump.ctp<\/td> | 0.10<\/td> | <\/div><\/div><\/td><\/tr>\n Event: View.afterLayout<\/td> | 0.00<\/td> | <\/div><\/div><\/td><\/tr><\/table><\/div>\n","log":" Logs<\/h2>\n\n\t\t\t\t There were no log entries made this request<\/p>\n\t<\/div>\n","variables":" View Variables<\/h2>\n- jvninfos<\/strong>(array)
- 0<\/strong>(array)
- Jvninfo<\/strong>(array)
- id<\/strong>2681<\/li>
- name<\/strong>JVNDB-2016-003454<\/li>
- title<\/strong>Eaton ELCSoft \u306e ELCSimulator \u306b\u304a\u3051\u308b\u30b9\u30bf\u30c3\u30af\u30d9\u30fc\u30b9\u306e\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u8106\u5f31\u6027<\/li>
- summary<\/strong>Eaton ELCSoft \u306e ELCSimulator \u306b\u306f\u3001\u30b9\u30bf\u30c3\u30af\u30d9\u30fc\u30b9\u306e\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u8106\u5f31\u6027\u304c\u5b58\u5728\u3057\u307e\u3059\u3002<\/li>
- cveinfo_name<\/strong>CVE-2016-4512<\/li>
- cveinfo_id<\/strong>91018<\/li>
- nvdinfo_name<\/strong>CVE-2016-4512<\/li>
- nvdinfo_id<\/strong>20136<\/li>
- cvssv2<\/strong>7.5<\/li>
- cvssv3<\/strong>7.3<\/li>
- jvnurl<\/strong>http:\/\/jvndb.jvn.jp\/ja\/contents\/2016\/JVNDB-2016-003454.html<\/li>
- published_date<\/strong>2016-06-30<\/li>
- registered_date<\/strong>2016-07-08<\/li>
- last_updated_date<\/strong>2016-07-08<\/li>
- deleted<\/strong>(null)<\/li>
- created<\/strong>0000-00-00 00:00:00<\/li>
- modified<\/strong>(null)<\/li><\/ul><\/li>
- Cveinfo<\/strong>(array)
- id<\/strong>91018<\/li>
- name<\/strong>CVE-2016-4199<\/li>
- status<\/strong>Candidate<\/li>
- description<\/strong>Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254.<\/li>
- phase<\/strong>Assigned (20160427)<\/li>
- votes<\/strong>None (candidate not yet proposed)<\/li>
- comments<\/strong>(null)<\/li>
- deleted<\/strong>(null)<\/li>
- created<\/strong>0000-00-00 00:00:00<\/li>
- modified<\/strong>0000-00-00 00:00:00<\/li><\/ul><\/li>
- Nvdinfo<\/strong>(array)
- id<\/strong>20136<\/li>
- name<\/strong>CVE-2016-4512<\/li>
- description<\/strong>Stack-based buffer overflow in ELCSimulator in Eaton ELCSoft 2.4.01 and earlier allows remote attackers to execute arbitrary code via a long packet.<\/li>
- reject<\/strong>(null)<\/li>
- CVSS_version<\/strong>2<\/li>
- CVSS_score<\/strong>7.5<\/li>
- severity<\/strong>High<\/li>
- CVSS_base_score<\/strong>7.5<\/li>
- CVSS_impact_subscore<\/strong>6.4<\/li>
- CVSS_exploit_subscore<\/strong>10<\/li>
| | | | | | | | | | | | | |
|