CVE-2025-25066
- EPSS 0.03%
- Veröffentlicht 03.02.2025 06:15:11
- Zuletzt bearbeitet 02.10.2025 18:29:35
nDPI through 4.12 has a potential stack-based buffer overflow in ndpi_address_cache_restore in lib/ndpi_cache.c.
CVE-2021-36082
- EPSS 0.5%
- Veröffentlicht 01.07.2021 03:15:08
- Zuletzt bearbeitet 21.11.2024 06:13:06
ntop nDPI 3.4 has a stack-based buffer overflow in processClientServerHello.
CVE-2020-15471
- EPSS 0.56%
- Veröffentlicht 01.07.2020 11:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:34
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVE-2020-15472
- EPSS 0.66%
- Veröffentlicht 01.07.2020 11:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:34
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
CVE-2020-15473
- EPSS 0.43%
- Veröffentlicht 01.07.2020 11:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:35
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.
CVE-2020-15474
- EPSS 0.5%
- Veröffentlicht 01.07.2020 11:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:35
In nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c.
CVE-2020-15475
- EPSS 0.69%
- Veröffentlicht 01.07.2020 11:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:35
In nDPI through 3.2, ndpi_reset_packet_line_info in lib/ndpi_main.c omits certain reinitialization, leading to a use-after-free.
CVE-2020-15476
- EPSS 1.07%
- Veröffentlicht 01.07.2020 11:15:11
- Zuletzt bearbeitet 21.11.2024 05:05:35
In nDPI through 3.2, the Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle in lib/protocols/oracle.c.
CVE-2020-11939
- EPSS 8.34%
- Veröffentlicht 23.04.2020 15:15:14
- Zuletzt bearbeitet 21.11.2024 04:58:56
In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to con...
CVE-2020-11940
- EPSS 0.47%
- Veröffentlicht 23.04.2020 15:15:14
- Zuletzt bearbeitet 21.11.2024 04:58:56
In nDPI through 3.2 Stable, an out-of-bounds read in concat_hash_string in ssh.c can be exploited by a network-positioned attacker that can send malformed SSH protocol messages on a network segment monitored by nDPI's library.