curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2021/Apr/50 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Apr/51 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Apr/54 - Mailing List, Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory | |
References | () https://curl.se/docs/CVE-2020-8286.html - Vendor Advisory | |
References | () https://hackerone.com/reports/1048457 - Exploit, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202012-14 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210122-0007/ - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212325 - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212326 - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212327 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4881 - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory |
27 Mar 2024, 15:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* |
|
First Time |
Splunk
Splunk universal Forwarder |
07 Nov 2023, 03:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-12-14 20:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8286
Mitre link : CVE-2020-8286
CVE.ORG link : CVE-2020-8286
JSON object : View
Products Affected
debian
- debian_linux
splunk
- universal_forwarder
siemens
- simatic_tim_1531_irc_firmware
- sinec_infrastructure_network_services
- simatic_tim_1531_irc
fedoraproject
- fedora
haxx
- libcurl
netapp
- clustered_data_ontap
- hci_management_node
- hci_storage_node
- hci_compute_node
- solidfire
- hci_storage_node_firmware
- hci_bootstrap_os
oracle
- essbase
- peoplesoft_enterprise_peopletools
- communications_cloud_native_core_policy
- communications_billing_and_revenue_management
apple
- macos
- mac_os_x
CWE
CWE-295
Improper Certificate Validation