CVE-2024-6387 (CNNVD-202407-017)
HIGH
有利用代码
中文标题:
OpenSSH 竞争条件问题漏洞
英文标题:
Openssh: regresshion - race condition in ssh allows rce/dos
CVSS分数:
8.1
发布时间:
2024-07-01 12:37:25
漏洞类型:
竞争条件问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v4
漏洞描述
中文描述:
OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在竞争条件问题漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。
英文描述:
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CWE类型:
CWE-362
CWE-364
标签:
remote
linux
Milad karimi
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 9 | 9 | - | - |
cpe:/o:redhat:enterprise_linux:9::baseos
|
| Red Hat | Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | 9.0 | - | - |
cpe:/a:redhat:rhel_e4s:9.0::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support | 9.2 | - | - |
cpe:/o:redhat:rhel_eus:9.2::baseos
|
| Red Hat | Red Hat OpenShift Container Platform 4.13 | 4.13 | - | - |
cpe:/a:redhat:openshift:4.13::el8
|
| Red Hat | Red Hat OpenShift Container Platform 4.14 | 4.14 | - | - |
cpe:/a:redhat:openshift:4.14::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4.15 | 4.15 | - | - |
cpe:/a:redhat:openshift:4.15::el9
|
| Red Hat | Red Hat OpenShift Container Platform 4.16 | 4.16 | - | - |
cpe:/a:redhat:openshift:4.16::el9
|
| Red Hat | Red Hat Ceph Storage 5 | - | - | - |
cpe:/a:redhat:ceph_storage:5
|
| Red Hat | Red Hat Ceph Storage 6 | - | - | - |
cpe:/a:redhat:ceph_storage:6
|
| Red Hat | Red Hat Ceph Storage 7 | - | - | - |
cpe:/a:redhat:ceph_storage:7
|
| Red Hat | Red Hat Enterprise Linux 10 | - | - | - |
cpe:/o:redhat:enterprise_linux:10
|
| Red Hat | Red Hat Enterprise Linux 6 | - | - | - |
cpe:/o:redhat:enterprise_linux:6
|
| Red Hat | Red Hat Enterprise Linux 7 | - | - | - |
cpe:/o:redhat:enterprise_linux:7
|
| Red Hat | Red Hat Enterprise Linux 8 | - | - | - |
cpe:/o:redhat:enterprise_linux:8
|
| sonicwall | sma_6200_firmware | - | - | - |
cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:*
|
| sonicwall | sma_7200_firmware | - | - | - |
cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:*
|
| arista | eos | * | - | - |
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 23.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 24.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
|
| almalinux | almalinux | 9.0 | - | - |
cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*
|
| sonicwall | sma_6210_firmware | - | - | - |
cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:*
|
| sonicwall | sma_7210_firmware | - | - | - |
cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:*
|
| sonicwall | sma_8200v_firmware | - | - | - |
cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:*
|
| sonicwall | sra_ex_7000_firmware | - | - | - |
cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:*
|
| netapp | a1k_firmware | - | - | - |
cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*
|
| netapp | a70_firmware | - | - | - |
cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*
|
| netapp | a90_firmware | - | - | - |
cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*
|
| netapp | a700s_firmware | - | - | - |
cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*
|
| netapp | 8300_firmware | - | - | - |
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
|
| netapp | 8700_firmware | - | - | - |
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
|
| netapp | a400_firmware | - | - | - |
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
|
| netapp | c400_firmware | - | - | - |
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
|
| netapp | a250_firmware | - | - | - |
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
|
| netapp | 500f_firmware | - | - | - |
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
|
| netapp | c250_firmware | - | - | - |
cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
|
| netapp | a800_firmware | - | - | - |
cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*
|
| netapp | c800_firmware | - | - | - |
cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*
|
| netapp | a900_firmware | - | - | - |
cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*
|
| netapp | a9500_firmware | - | - | - |
cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*
|
| netapp | c190_firmware | - | - | - |
cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*
|
| netapp | a150_firmware | - | - | - |
cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*
|
| netapp | a220_firmware | - | - | - |
cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*
|
| netapp | fas2720_firmware | - | - | - |
cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*
|
| netapp | fas2750_firmware | - | - | - |
cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*
|
| netapp | fas2820_firmware | - | - | - |
cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*
|
| netapp | bootstrap_os | - | - | - |
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
|
| apple | macos | * | - | - |
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
|
| openbsd | openssh | * | - | - |
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
|
| openbsd | openssh | 4.4 | - | - |
cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*
|
| openbsd | openssh | 8.5 | - | - |
cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*
|
| openbsd | openssh | 8.6 | - | - |
cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*
|
| redhat | openshift_container_platform | 4.0 | - | - |
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 9.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 9.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_arm_64 | 9.0_aarch64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_arm_64_eus | 9.4_aarch64 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 9.0_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems_eus | 9.4_s390x | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_little_endian | 9.0_ppc64le | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_little_endian_eus | 9.4_ppc64le | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 9.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
|
| suse | linux_enterprise_micro | 6.0 | - | - |
cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 12.0 | - | - |
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 22.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 22.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 23.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:*
|
| amazon | amazon_linux | 2023.0 | - | - |
cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*
|
| netapp | active_iq_unified_manager | - | - | - |
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
|
| netapp | e-series_santricity_os_controller | * | - | - |
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
|
| netapp | ontap | 9 | - | - |
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
|
| netapp | ontap_select_deploy_administration_utility | - | - | - |
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
|
| netapp | ontap_tools | 9 | - | - |
cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
|
| netapp | ontap_tools | 10 | - | - |
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
|
| freebsd | freebsd | 13.2 | - | - |
cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*
|
| freebsd | freebsd | 13.3 | - | - |
cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:*
|
| freebsd | freebsd | 14.0 | - | - |
cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*
|
| freebsd | freebsd | 14.1 | - | - |
cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:*
|
| netbsd | netbsd | * | - | - |
cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2024:4312
vendor-advisory
cve.org
访问
cve.org
RHSA-2024:4340
vendor-advisory
cve.org
访问
cve.org
RHSA-2024:4389
vendor-advisory
cve.org
访问
cve.org
RHSA-2024:4469
vendor-advisory
cve.org
访问
cve.org
RHSA-2024:4474
vendor-advisory
cve.org
访问
cve.org
RHSA-2024:4479
vendor-advisory
cve.org
访问
cve.org
RHSA-2024:4484
vendor-advisory
cve.org
访问
cve.org
无标题
vdb-entry
cve.org
访问
cve.org
RHBZ#2294604
issue-tracking
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
af854a3a-2127-422b-91ae-364da2661108
OTHER
nvd.nist.gov
访问
nvd.nist.gov
Download Exploit EDB-52269
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2024-6387
ADVISORY
cve.org
访问
cve.org
CVSS评分详情
3.1 (cna)
HIGH
8.1
CVSS向量:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2024-07-01 12:37:25
修改时间:
2025-07-24 13:11:10
创建时间:
2025-11-11 15:39:56
更新时间:
2025-11-11 17:02:38
利用信息
此漏洞有可利用代码!
利用代码数量:
1
利用来源:
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2024-6387 |
2025-11-11 15:22:55 | 2025-11-11 07:39:56 |
| NVD | nvd_CVE-2024-6387 |
2025-11-11 14:59:58 | 2025-11-11 07:47:48 |
| CNNVD | cnnvd_CNNVD-202407-017 |
2025-11-11 15:12:09 | 2025-11-11 07:58:56 |
| EXPLOITDB | exploitdb_EDB-52269 |
2025-11-11 15:05:26 | 2025-11-11 09:02:38 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4
EXPLOITDB
2025-11-11 17:02:38
references_count: 79 → 81; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 79 -> 81
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:58:56
vulnerability_type: 未提取 → 竞争条件问题; cnnvd_id: 未提取 → CNNVD-202407-017; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 竞争条件问题
- cnnvd_id: 未提取 -> CNNVD-202407-017
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:47:48
affected_products_count: 15 → 78; references_count: 12 → 79; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 15 -> 78
- references_count: 12 -> 79
- data_sources: ['cve'] -> ['cve', 'nvd']