VYPR
Low severity3.7NVD Advisory· Published Dec 14, 2020· Updated Apr 16, 2026

CVE-2020-8284

CVE-2020-8284

Description

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

Affected products

51
  • cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
    Range: <=7.73.0
  • cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
  • cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
    Range: <1.0.1.1
  • cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*range: >=8.2.0,<8.2.12
    • cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*
  • cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*
  • Apple Inc./macOS3 versions
    cpe:2.3:o:apple:macos:11.0.1:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:apple:macos:11.0.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:macos:11.1:*:*:*:*:*:*:*
    • cpe:2.3:o:apple:macos:11.2:*:*:*:*:*:*:*
  • Apple Inc./Mac Os X25 versions
    cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*+ 24 more
    • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*range: >=10.14.0,<10.14.6
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*
    • cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
    • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*
    Range: <xcp2410
  • cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*
    Range: <xcp2410
  • cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*
    Range: <xcp2410
  • cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*
    Range: <xcp2410
  • cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*
    Range: <xcp2410
  • cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*
    Range: <xcp2410
  • cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

16

News mentions

0

No linked articles in our index yet.