Логотип exploitDog
bind:"CVE-2020-8231" OR bind:"CVE-2020-8284" OR bind:"CVE-2020-8285" OR bind:"CVE-2020-8286"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-8231" OR bind:"CVE-2020-8284" OR bind:"CVE-2020-8285" OR bind:"CVE-2020-8286"

Количество 44

Количество 44

suse-cvrf логотип

SUSE-SU-2020:14481-1

больше 5 лет назад

Security update for curl

EPSS: Низкий
github логотип

GHSA-xp52-49j5-h754

больше 3 лет назад

Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2021-03503

больше 5 лет назад

Уязвимость программного средства для взаимодействия с серверами CURL, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2020-8284

около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2020-8284

около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2020-8284

около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2020-8284

около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port and this way potentially make curl extract information about services that are otherwise private and not disclosed for example doing port scanning and service banner extractions.

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2020-8284

около 5 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 ...

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-69rc-qfx4-h683

больше 3 лет назад

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
EPSS: Низкий
fstec логотип

BDU:2021-03504

около 5 лет назад

Уязвимость программного средства для взаимодействия с серверами CURL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2020-8286

около 5 лет назад

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2020-8286

около 5 лет назад

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2020-8286

около 5 лет назад

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2020-8286

около 5 лет назад

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-8286

около 5 лет назад

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for cert ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2020-8285

около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2020-8285

около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2020-8285

около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2020-8285

около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-8285

около 5 лет назад

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recu ...

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2020:14481-1

Security update for curl

0%
Низкий
больше 5 лет назад
github логотип
GHSA-xp52-49j5-h754

Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03503

Уязвимость программного средства для взаимодействия с серверами CURL, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-8284

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-8284

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.1
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-8284

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
0%
Низкий
около 5 лет назад
msrc логотип
CVE-2020-8284

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port and this way potentially make curl extract information about services that are otherwise private and not disclosed for example doing port scanning and service banner extractions.

CVSS3: 3.7
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-8284

A malicious server can use the FTP PASV response to trick curl 7.73.0 ...

CVSS3: 3.7
0%
Низкий
около 5 лет назад
github логотип
GHSA-69rc-qfx4-h683

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

CVSS3: 3.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03504

Уязвимость программного средства для взаимодействия с серверами CURL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 3.7
0%
Низкий
около 5 лет назад
ubuntu логотип
CVE-2020-8286

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.5
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-8286

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.4
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-8286

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.5
0%
Низкий
около 5 лет назад
msrc логотип
CVE-2020-8286

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

CVSS3: 7.5
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-8286

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for cert ...

CVSS3: 7.5
0%
Низкий
около 5 лет назад
ubuntu логотип
CVE-2020-8285

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
1%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-8285

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 6.5
1%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-8285

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
1%
Низкий
около 5 лет назад
msrc логотип
CVE-2020-8285

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

CVSS3: 7.5
1%
Низкий
около 5 лет назад
debian логотип
CVE-2020-8285

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recu ...

CVSS3: 7.5
1%
Низкий
около 5 лет назад

Уязвимостей на страницу