4.3

CVE-2020-8284

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

Data is provided by the National Vulnerability Database (NVD)
HaxxCurl Version <= 7.73.0
FedoraprojectFedora Version32
FedoraprojectFedora Version33
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
NetappSolidfire Version-
NetappHci Storage Node Version-
NetappHci Bootstrap Os Version-
   NetappHci Compute Node Version-
ApplemacOS X Version >= 10.14.0 < 10.14.6
ApplemacOS X Version >= 10.15 < 10.15.7
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-001
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-002
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-004
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-005
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-006
ApplemacOS X Version10.14.6 Updatesecurity_update_2019-007
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-001
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-002
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-003
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-004
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-005
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-006
ApplemacOS X Version10.14.6 Updatesecurity_update_2020-007
ApplemacOS X Version10.14.6 Updatesecurity_update_2021-001
ApplemacOS X Version10.14.6 Updatesecurity_update_2021-002
ApplemacOS X Version10.14.6 Updatesupplemental_update
ApplemacOS X Version10.14.6 Updatesupplemental_update_2
ApplemacOS X Version10.15.7 Update-
ApplemacOS X Version10.15.7 Updatesecurity_update_2020
ApplemacOS X Version10.15.7 Updatesecurity_update_2020-001
ApplemacOS X Version10.15.7 Updatesecurity_update_2020-005
ApplemacOS X Version10.15.7 Updatesecurity_update_2020-007
ApplemacOS X Version10.15.7 Updatesecurity_update_2021-001
ApplemacOS X Version10.15.7 Updatesupplemental_update
ApplemacOS Version11.0.1
ApplemacOS Version11.1
ApplemacOS Version11.2
OracleEssbase Version21.2
FujitsuM10-1 Firmware Version < xcp2410
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version < xcp2410
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version < xcp2410
   FujitsuM10-4s Version-
FujitsuM12-1 Firmware Version < xcp2410
   FujitsuM12-1 Version-
FujitsuM12-2 Firmware Version < xcp2410
   FujitsuM12-2 Version-
FujitsuM12-2s Firmware Version < xcp2410
   FujitsuM12-2s Version-
FujitsuM10-1 Firmware Version < xcp3110
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version < xcp3110
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version < xcp3110
   FujitsuM10-4s Version-
FujitsuM12-1 Firmware Version < xcp3110
   FujitsuM12-1 Version-
FujitsuM12-2 Firmware Version < xcp3110
   FujitsuM12-2 Version-
FujitsuM12-2s Firmware Version < xcp3110
   FujitsuM12-2s Version-
SplunkUniversal Forwarder Version >= 8.2.0 < 8.2.12
SplunkUniversal Forwarder Version >= 9.0.0 < 9.0.6
SplunkUniversal Forwarder Version9.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.274
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.7 2.2 1.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.