Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-8285
Description:curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
Test IDs: 1.3.6.1.4.1.25623.1.1.2.2021.1063   1.3.6.1.4.1.25623.1.0.892500   1.3.6.1.4.1.25623.1.1.2.2021.1410   1.3.6.1.4.1.25623.1.1.2.2021.1287   1.3.6.1.4.1.25623.1.0.704881   1.3.6.1.4.1.25623.1.1.2.2021.1672   1.3.6.1.4.1.25623.1.1.2.2021.1399  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-8285
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
Debian Security Information: DSA-4881 (Google Search)
https://www.debian.org/security/2021/dsa-4881
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
http://seclists.org/fulldisclosure/2021/Apr/51
https://security.gentoo.org/glsa/202012-14
https://curl.se/docs/CVE-2020-8285.html
https://curl.se/docs/CVE-2020-8285.html
https://github.com/curl/curl/issues/6255
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://hackerone.com/reports/1045844
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html




© 1998-2024 E-Soft Inc. All rights reserved.