CVE-2014-6271 (CNNVD-201409-938)

CRITICAL 有利用代码
中文标题:
GNU Bash 远程代码执行漏洞
英文标题:
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environm...
CVSS分数: 9.8
发布时间: 2014-09-24 18:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v24
漏洞描述
中文描述:

GNU Bash是美国软件开发者布莱恩-福克斯(Brian J. Fox)为GNU计划而编写的一个Shell(命令语言解释器),它运行于类Unix操作系统中(Linux系统的默认Shell),并能够从标准输入设备或文件中读取、执行命令,同时也结合了一部分ksh和csh的特点。 GNU Bash 4.3及之前版本中存在安全漏洞,该漏洞源于程序没有正确处理环境变量值内的函数定义。远程攻击者可借助特制的环境变量利用该漏洞执行任意代码。以下产品和模块可能会被利用:OpenSSH sshd中的ForceCommand功能,Apache HTTP Server中的mod_cgi和mod_cgid模块,DHCP客户端等。(说明:该漏洞的补丁并没有完全修复该问题,CNNVD-201409-956补充了不完整修复后仍存在的问题)

英文描述:

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CWE类型:
CWE-78
标签:
remote linux Stephane Chazelas OSVDB-112004 Prakhar Prasad & Subho Halder cgi Shaun Colley webapps Claudio Viviani @0x00string OSVDB-112169 OSVDB-112158 OSVDB-112097 OSVDB-112096 Metasploit hobbily plunt Fady Mohammed Osman Phil Blank Federico Galatolo php Ryan King (Starfall) hardware Patrick Pellegrino multiple Roberto Suggi Liverani OSVDB-120255 OSVDB-120254 OSVDB-120253 OSVDB-120252 OSVDB-120251 OSVDB-120250 OSVDB-120249 Bernhard Mueller OSVDB-126132 OSVDB-126131 OSVDB-117422 Hacker Fantastic local
受影响产品
厂商 产品 版本 版本范围 平台 CPE
gnu bash * - - cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*
arista eos * - - cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
oracle linux 4 - - cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
oracle linux 5 - - cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
oracle linux 6 - - cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
qnap qts * - - cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
qnap qts 4.1.1 - - cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*
mageia mageia 3.0 - - cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
mageia mageia 4.0 - - cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
redhat gluster_storage_server_for_on-premise 2.1 - - cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*
redhat virtualization 3.4 - - cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*
redhat enterprise_linux 4.0 - - cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
redhat enterprise_linux 5.0 - - cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
redhat enterprise_linux 6.0 - - cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
redhat enterprise_linux 7.0 - - cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 5.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 6.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 7.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_eus 5.9 - - cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
redhat enterprise_linux_eus 6.4 - - cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
redhat enterprise_linux_eus 6.5 - - cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.4 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.5 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 5.9_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 6.4_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 6.5_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 7.3_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 7.4_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 7.5_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 7.6_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 7.7_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian 5.0_ppc - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian 5.9_ppc - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian 6.0_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian 6.4_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian 7.0_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian_eus 6.5_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian_eus 7.3_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian_eus 7.4_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian_eus 7.5_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian_eus 7.6_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_big_endian_eus 7.7_ppc64 - - cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*
redhat enterprise_linux_for_scientific_computing 6.0 - - cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_for_scientific_computing 7.0 - - cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 5.0 - - cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 6.0 - - cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 7.0 - - cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 5.6 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 5.9 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 6.2 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 6.4 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 6.5 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.4 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_server_from_rhui 5.0 - - cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_server_from_rhui 6.0 - - cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_server_from_rhui 7.0 - - cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 6.5 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 5.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 6.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 7.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
suse studio_onsite 1.3 - - cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*
opensuse opensuse 12.3 - - cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
opensuse opensuse 13.1 - - cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
opensuse opensuse 13.2 - - cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
suse linux_enterprise_desktop 11 - - cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
suse linux_enterprise_desktop 12 - - cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
suse linux_enterprise_server 10 - - cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
suse linux_enterprise_server 11 - - cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*
suse linux_enterprise_server 12 - - cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
suse linux_enterprise_software_development_kit 11 - - cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
suse linux_enterprise_software_development_kit 12 - - cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
debian debian_linux 7.0 - - cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
ibm infosphere_guardium_database_activity_monitoring 8.2 - - cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*
ibm infosphere_guardium_database_activity_monitoring 9.0 - - cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*
ibm infosphere_guardium_database_activity_monitoring 9.1 - - cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*
ibm pureapplication_system * - - cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*
ibm pureapplication_system 2.0.0.0 - - cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
ibm qradar_risk_manager 7.1.0 - - cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.1.0 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.1.1 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.1.2 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.0 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.1 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.2 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.3 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.4 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.5 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.6 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.7 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.8 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.8.15 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*
ibm qradar_security_information_and_event_manager 7.2.9 - - cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*
ibm qradar_vulnerability_manager 7.2.0 - - cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*
ibm qradar_vulnerability_manager 7.2.1 - - cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*
ibm qradar_vulnerability_manager 7.2.2 - - cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*
ibm qradar_vulnerability_manager 7.2.3 - - cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*
ibm qradar_vulnerability_manager 7.2.4 - - cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*
ibm qradar_vulnerability_manager 7.2.6 - - cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*
ibm qradar_vulnerability_manager 7.2.8 - - cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*
ibm smartcloud_entry_appliance 2.3.0 - - cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*
ibm smartcloud_entry_appliance 2.4.0 - - cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*
ibm smartcloud_entry_appliance 3.1.0 - - cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*
ibm smartcloud_entry_appliance 3.2.0 - - cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*
ibm smartcloud_provisioning 2.1.0 - - cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*
ibm software_defined_network_for_virtual_environments * - - cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:*
ibm starter_kit_for_cloud 2.2.0 - - cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*
ibm workload_deployer * - - cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:*
ibm security_access_manager_for_mobile_8.0_firmware 8.0.0.1 - - cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*
ibm security_access_manager_for_mobile_8.0_firmware 8.0.0.2 - - cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
ibm security_access_manager_for_mobile_8.0_firmware 8.0.0.3 - - cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
ibm security_access_manager_for_mobile_8.0_firmware 8.0.0.5 - - cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.1 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.2 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.3 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.4 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.5 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.6 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.7 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*
ibm security_access_manager_for_web_7.0_firmware 7.0.0.8 - - cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*
ibm security_access_manager_for_web_8.0_firmware 8.0.0.2 - - cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*
ibm security_access_manager_for_web_8.0_firmware 8.0.0.3 - - cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*
ibm security_access_manager_for_web_8.0_firmware 8.0.0.5 - - cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*
ibm storwize_v7000_firmware * - - cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*
ibm storwize_v5000_firmware * - - cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*
ibm storwize_v3700_firmware * - - cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*
ibm storwize_v3500_firmware * - - cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*
ibm flex_system_v7000_firmware * - - cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*
ibm san_volume_controller_firmware * - - cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*
ibm stn6500_firmware * - - cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*
ibm stn6800_firmware * - - cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*
ibm stn7800_firmware * - - cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*
canonical ubuntu_linux 10.04 - - cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
canonical ubuntu_linux 12.04 - - cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
canonical ubuntu_linux 14.04 - - cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
novell zenworks_configuration_management 10.3 - - cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
novell zenworks_configuration_management 11 - - cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
novell zenworks_configuration_management 11.1 - - cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
novell zenworks_configuration_management 11.2 - - cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*
novell zenworks_configuration_management 11.3.0 - - cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*
novell open_enterprise_server 2.0 - - cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*
novell open_enterprise_server 11.0 - - cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*
checkpoint security_gateway * - - cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:*
f5 big-ip_access_policy_manager * - - cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5 big-ip_access_policy_manager 11.6.0 - - cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*
f5 big-ip_advanced_firewall_manager * - - cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5 big-ip_advanced_firewall_manager 11.6.0 - - cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*
f5 big-ip_analytics * - - cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5 big-ip_analytics 11.6.0 - - cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*
f5 big-ip_application_acceleration_manager * - - cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
f5 big-ip_application_acceleration_manager 11.6.0 - - cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*
f5 big-ip_application_security_manager * - - cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
f5 big-ip_application_security_manager 11.6.0 - - cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*
f5 big-ip_edge_gateway * - - cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
f5 big-ip_global_traffic_manager * - - cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
f5 big-ip_global_traffic_manager 11.6.0 - - cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*
f5 big-ip_link_controller * - - cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
f5 big-ip_link_controller 11.6.0 - - cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*
f5 big-ip_local_traffic_manager * - - cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
f5 big-ip_local_traffic_manager 11.6.0 - - cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*
f5 big-ip_policy_enforcement_manager * - - cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
f5 big-ip_policy_enforcement_manager 11.6.0 - - cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*
f5 big-ip_protocol_security_module * - - cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
f5 big-ip_wan_optimization_manager * - - cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
f5 big-ip_webaccelerator * - - cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
f5 big-iq_cloud * - - cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*
f5 big-iq_device * - - cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*
f5 big-iq_security * - - cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*
f5 enterprise_manager * - - cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*
f5 traffix_signaling_delivery_controller * - - cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*
f5 traffix_signaling_delivery_controller 3.3.2 - - cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*
f5 traffix_signaling_delivery_controller 3.4.1 - - cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*
f5 traffix_signaling_delivery_controller 3.5.1 - - cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*
f5 traffix_signaling_delivery_controller 4.1.0 - - cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*
f5 arx_firmware * - - cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*
citrix netscaler_sdx_firmware * - - cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*
apple mac_os_x * - - cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
vmware vcenter_server_appliance 5.0 - - cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*
vmware vcenter_server_appliance 5.1 - - cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*
vmware vcenter_server_appliance 5.5 - - cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*
vmware esx 4.0 - - cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
vmware esx 4.1 - - cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
37816 exploit
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
SUSE-SU-2014:1223 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBMU03165 vendor-advisory
cve.org
访问
SSRT101816 vendor-advisory
cve.org
访问
39918 exploit
cve.org
访问
HPSBHF03119 vendor-advisory
cve.org
访问
RHSA-2014:1295 vendor-advisory
cve.org
访问
openSUSE-SU-2014:1226 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBST03131 vendor-advisory
cve.org
访问
SSRT101819 vendor-advisory
cve.org
访问
20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities mailing-list
cve.org
访问
HPSBMU03245 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61188 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
JVN#55667175 third-party-advisory
cve.org
访问
61676 third-party-advisory
cve.org
访问
40619 exploit
cve.org
访问
openSUSE-SU-2014:1254 vendor-advisory
cve.org
访问
60433 third-party-advisory
cve.org
访问
38849 exploit
cve.org
访问
HPSBMU03143 vendor-advisory
cve.org
访问
HPSBMU03182 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
SUSE-SU-2014:1260 vendor-advisory
cve.org
访问
HPSBST03155 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61715 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61816 third-party-advisory
cve.org
访问
openSUSE-SU-2014:1310 vendor-advisory
cve.org
访问
61442 third-party-advisory
cve.org
访问
HPSBMU03246 vendor-advisory
cve.org
访问
HPSBST03195 vendor-advisory
cve.org
访问
61283 third-party-advisory
cve.org
访问
SSRT101711 vendor-advisory
cve.org
访问
USN-2362-1 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
openSUSE-SU-2014:1308 vendor-advisory
cve.org
访问
61654 third-party-advisory
cve.org
访问
61542 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62312 third-party-advisory
cve.org
访问
59272 third-party-advisory
cve.org
访问
HPSBST03122 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBMU03217 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
SSRT101868 vendor-advisory
cve.org
访问
61703 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
VU#252743 third-party-advisory
cve.org
访问
61065 third-party-advisory
cve.org
访问
SUSE-SU-2014:1213 vendor-advisory
cve.org
访问
HPSBST03129 vendor-advisory
cve.org
访问
HPSBMU03144 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
70103 vdb-entry
cve.org
访问
JVNDB-2014-000126 third-party-advisory
cve.org
访问
TA14-268A third-party-advisory
cve.org
访问
SUSE-SU-2014:1212 vendor-advisory
cve.org
访问
61641 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
SUSE-SU-2014:1287 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
APPLE-SA-2014-10-16-1 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities mailing-list
cve.org
访问
MDVSA-2015:164 vendor-advisory
cve.org
访问
RHSA-2014:1293 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
openSUSE-SU-2014:1238 vendor-advisory
cve.org
访问
60325 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
60024 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
34879 exploit
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62343 third-party-advisory
cve.org
访问
61565 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBST03157 vendor-advisory
cve.org
访问
61313 third-party-advisory
cve.org
访问
61873 third-party-advisory
cve.org
访问
61485 third-party-advisory
cve.org
访问
60947 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBST03154 vendor-advisory
cve.org
访问
HPSBST03265 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBGN03142 vendor-advisory
cve.org
访问
61312 third-party-advisory
cve.org
访问
60193 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
60063 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
60034 third-party-advisory
cve.org
访问
HPSBMU03133 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
59907 third-party-advisory
cve.org
访问
58200 third-party-advisory
cve.org
访问
HPSBST03181 vendor-advisory
cve.org
访问
61643 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61503 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
RHSA-2014:1354 vendor-advisory
cve.org
访问
40938 exploit
cve.org
访问
HPSBGN03117 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61547 third-party-advisory
cve.org
访问
HPSBHF03145 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBST03148 vendor-advisory
cve.org
访问
61552 third-party-advisory
cve.org
访问
61780 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
DSA-3032 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62228 third-party-advisory
cve.org
访问
HPSBGN03138 vendor-advisory
cve.org
访问
61855 third-party-advisory
cve.org
访问
HPSBHF03124 vendor-advisory
cve.org
访问
60044 third-party-advisory
cve.org
访问
61291 third-party-advisory
cve.org
访问
RHSA-2014:1294 vendor-advisory
cve.org
访问
HPSBHF03125 vendor-advisory
cve.org
访问
59737 third-party-advisory
cve.org
访问
61287 third-party-advisory
cve.org
访问
HPSBHF03146 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61711 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBGN03141 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61128 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61471 third-party-advisory
cve.org
访问
60055 third-party-advisory
cve.org
访问
20140926 GNU Bash Environmental Variable Command Injection Vulnerability vendor-advisory
cve.org
访问
61550 third-party-advisory
cve.org
访问
61633 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
61328 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
42938 exploit
cve.org
访问
61129 third-party-advisory
cve.org
访问
61700 third-party-advisory
cve.org
访问
61603 third-party-advisory
cve.org
访问
61857 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
ExploitDB EDB-34765 EXPLOIT
exploitdb
访问
Download Exploit EDB-34765 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2014-7910 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-7227 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-7196 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-7169 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-62771 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-6271 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-3671 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-3659 ADVISORY
cve.org
访问
ExploitDB EDB-34766 EXPLOIT
exploitdb
访问
Download Exploit EDB-34766 EXPLOIT
exploitdb
访问
ExploitDB EDB-34777 EXPLOIT
exploitdb
访问
Download Exploit EDB-34777 EXPLOIT
exploitdb
访问
ExploitDB EDB-34839 EXPLOIT
exploitdb
访问
Download Exploit EDB-34839 EXPLOIT
exploitdb
访问
ExploitDB EDB-34860 EXPLOIT
exploitdb
访问
Download Exploit EDB-34860 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2014-7187 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-7186 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-6278 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-6277 ADVISORY
cve.org
访问
ExploitDB EDB-34862 EXPLOIT
exploitdb
访问
Download Exploit EDB-34862 EXPLOIT
exploitdb
访问
ExploitDB EDB-34879 EXPLOIT
exploitdb
访问
Download Exploit EDB-34879 EXPLOIT
exploitdb
访问
ExploitDB EDB-34895 EXPLOIT
exploitdb
访问
Download Exploit EDB-34895 EXPLOIT
exploitdb
访问
ExploitDB EDB-34896 EXPLOIT
exploitdb
访问
Download Exploit EDB-34896 EXPLOIT
exploitdb
访问
ExploitDB EDB-34900 EXPLOIT
exploitdb
访问
Download Exploit EDB-34900 EXPLOIT
exploitdb
访问
ExploitDB EDB-35115 EXPLOIT
exploitdb
访问
Download Exploit EDB-35115 EXPLOIT
exploitdb
访问
ExploitDB EDB-35146 EXPLOIT
exploitdb
访问
Download Exploit EDB-35146 EXPLOIT
exploitdb
访问
ExploitDB EDB-36503 EXPLOIT
exploitdb
访问
Download Exploit EDB-36503 EXPLOIT
exploitdb
访问
ExploitDB EDB-36504 EXPLOIT
exploitdb
访问
Download Exploit EDB-36504 EXPLOIT
exploitdb
访问
ExploitDB EDB-36609 EXPLOIT
exploitdb
访问
Download Exploit EDB-36609 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2014-5288 ADVISORY
cve.org
访问
CVE Reference: CVE-2014-5287 ADVISORY
cve.org
访问
ExploitDB EDB-37816 EXPLOIT
exploitdb
访问
Download Exploit EDB-37816 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2014-8008 ADVISORY
cve.org
访问
ExploitDB EDB-38849 EXPLOIT
exploitdb
访问
Download Exploit EDB-38849 EXPLOIT
exploitdb
访问
ExploitDB EDB-39918 EXPLOIT
exploitdb
访问
Download Exploit EDB-39918 EXPLOIT
exploitdb
访问
ExploitDB EDB-40619 EXPLOIT
exploitdb
访问
Download Exploit EDB-40619 EXPLOIT
exploitdb
访问
ExploitDB EDB-40938 EXPLOIT
exploitdb
访问
Download Exploit EDB-40938 EXPLOIT
exploitdb
访问
ExploitDB EDB-42938 EXPLOIT
exploitdb
访问
Download Exploit EDB-42938 EXPLOIT
exploitdb
访问
CVSS评分详情
3.1 (adp)
CRITICAL
9.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2014-09-24 18:00:00
修改时间:
2025-10-22 00:05:36
创建时间:
2025-11-11 15:33:51
更新时间:
2025-11-11 16:45:05
利用信息
此漏洞有可利用代码!
利用代码数量: 21
利用来源:
未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2014-6271 2025-11-11 15:18:48 2025-11-11 07:33:51
NVD nvd_CVE-2014-6271 2025-11-11 14:54:34 2025-11-11 07:42:36
CNNVD cnnvd_CNNVD-201409-938 2025-11-11 15:09:29 2025-11-11 07:51:38
EXPLOITDB exploitdb_EDB-34765 2025-11-11 15:05:26 2025-11-11 08:30:21
EXPLOITDB exploitdb_EDB-34766 2025-11-11 15:05:25 2025-11-11 08:30:21
EXPLOITDB exploitdb_EDB-34777 2025-11-11 15:05:21 2025-11-11 08:30:22
EXPLOITDB exploitdb_EDB-34839 2025-11-11 15:05:21 2025-11-11 08:30:28
EXPLOITDB exploitdb_EDB-34860 2025-11-11 15:05:26 2025-11-11 08:30:30
EXPLOITDB exploitdb_EDB-34862 2025-11-11 15:05:26 2025-11-11 08:30:30
EXPLOITDB exploitdb_EDB-34879 2025-11-11 15:05:26 2025-11-11 08:30:31
EXPLOITDB exploitdb_EDB-34895 2025-11-11 15:05:21 2025-11-11 08:30:32
EXPLOITDB exploitdb_EDB-34896 2025-11-11 15:05:26 2025-11-11 08:30:32
EXPLOITDB exploitdb_EDB-34900 2025-11-11 15:05:25 2025-11-11 08:30:32
EXPLOITDB exploitdb_EDB-35115 2025-11-11 15:05:26 2025-11-11 08:30:51
EXPLOITDB exploitdb_EDB-35146 2025-11-11 15:05:40 2025-11-11 08:30:55
EXPLOITDB exploitdb_EDB-36503 2025-11-11 15:05:22 2025-11-11 08:33:23
EXPLOITDB exploitdb_EDB-36504 2025-11-11 15:05:22 2025-11-11 08:33:23
EXPLOITDB exploitdb_EDB-36609 2025-11-11 15:05:29 2025-11-11 08:33:31
EXPLOITDB exploitdb_EDB-37816 2025-11-11 15:05:28 2025-11-11 08:35:37
EXPLOITDB exploitdb_EDB-38849 2025-11-11 15:05:21 2025-11-11 08:37:27
EXPLOITDB exploitdb_EDB-39918 2025-11-11 15:05:21 2025-11-11 08:39:21
EXPLOITDB exploitdb_EDB-40619 2025-11-11 15:05:22 2025-11-11 08:40:56
EXPLOITDB exploitdb_EDB-40938 2025-11-11 15:05:25 2025-11-11 08:41:31
EXPLOITDB exploitdb_EDB-42938 2025-11-11 15:05:26 2025-11-11 08:45:05
版本与语言
当前版本: v24
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v24 EXPLOITDB
2025-11-11 16:45:05
references_count: 226 → 228
查看详细变更
  • references_count: 226 -> 228
v23 EXPLOITDB
2025-11-11 16:41:31
references_count: 224 → 226; tags_count: 37 → 38
查看详细变更
  • references_count: 224 -> 226
  • tags_count: 37 -> 38
v22 EXPLOITDB
2025-11-11 16:40:56
references_count: 222 → 224; tags_count: 36 → 37
查看详细变更
  • references_count: 222 -> 224
  • tags_count: 36 -> 37
v21 EXPLOITDB
2025-11-11 16:39:21
references_count: 220 → 222
查看详细变更
  • references_count: 220 -> 222
v20 EXPLOITDB
2025-11-11 16:37:27
references_count: 218 → 220
查看详细变更
  • references_count: 218 -> 220
v19 EXPLOITDB
2025-11-11 16:35:37
references_count: 215 → 218; tags_count: 32 → 36
查看详细变更
  • references_count: 215 -> 218
  • tags_count: 32 -> 36
v18 EXPLOITDB
2025-11-11 16:33:31
references_count: 211 → 215; tags_count: 23 → 32
查看详细变更
  • references_count: 211 -> 215
  • tags_count: 23 -> 32
v17 EXPLOITDB
2025-11-11 16:33:23
references_count: 209 → 211
查看详细变更
  • references_count: 209 -> 211
v16 EXPLOITDB
2025-11-11 16:33:23
references_count: 207 → 209; tags_count: 21 → 23
查看详细变更
  • references_count: 207 -> 209
  • tags_count: 21 -> 23
v15 EXPLOITDB
2025-11-11 16:30:55
references_count: 205 → 207; tags_count: 19 → 21
查看详细变更
  • references_count: 205 -> 207
  • tags_count: 19 -> 21
v14 EXPLOITDB
2025-11-11 16:30:51
references_count: 203 → 205
查看详细变更
  • references_count: 203 -> 205
v13 EXPLOITDB
2025-11-11 16:30:32
references_count: 201 → 203; tags_count: 18 → 19
查看详细变更
  • references_count: 201 -> 203
  • tags_count: 18 -> 19
v12 EXPLOITDB
2025-11-11 16:30:32
references_count: 199 → 201; tags_count: 17 → 18
查看详细变更
  • references_count: 199 -> 201
  • tags_count: 17 -> 18
v11 EXPLOITDB
2025-11-11 16:30:32
references_count: 197 → 199; tags_count: 16 → 17
查看详细变更
  • references_count: 197 -> 199
  • tags_count: 16 -> 17
v10 EXPLOITDB
2025-11-11 16:30:31
references_count: 195 → 197; tags_count: 15 → 16
查看详细变更
  • references_count: 195 -> 197
  • tags_count: 15 -> 16
v9 EXPLOITDB
2025-11-11 16:30:30
references_count: 193 → 195; tags_count: 14 → 15
查看详细变更
  • references_count: 193 -> 195
  • tags_count: 14 -> 15
v8 EXPLOITDB
2025-11-11 16:30:30
references_count: 187 → 193; tags_count: 9 → 14
查看详细变更
  • references_count: 187 -> 193
  • tags_count: 9 -> 14
v7 EXPLOITDB
2025-11-11 16:30:28
references_count: 185 → 187; tags_count: 7 → 9
查看详细变更
  • references_count: 185 -> 187
  • tags_count: 7 -> 9
v6 EXPLOITDB
2025-11-11 16:30:22
references_count: 183 → 185; tags_count: 5 → 7
查看详细变更
  • references_count: 183 -> 185
  • tags_count: 5 -> 7
v5 EXPLOITDB
2025-11-11 16:30:21
references_count: 181 → 183; tags_count: 4 → 5
查看详细变更
  • references_count: 181 -> 183
  • tags_count: 4 -> 5
v4 EXPLOITDB
2025-11-11 16:30:21
references_count: 171 → 181; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 171 -> 181
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:51:38
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201409-938; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201409-938
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:36
affected_products_count: 0 → 191; references_count: 177 → 171; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 0 -> 191
  • references_count: 177 -> 171
  • data_sources: ['cve'] -> ['cve', 'nvd']