{"id":"CVE-2020-15471","details":"In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.","modified":"2026-02-23T08:22:01.795292Z","published":"2020-07-01T11:15:11.037Z","references":[{"type":"WEB","url":"https://github.com/fuzzing2026/CVE-PoCs/tree/main/ndpi-CVE-2020-15471"},{"type":"ADVISORY","url":"https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622"},{"type":"FIX","url":"https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ntop/ndpi","events":[{"introduced":"0"},{"last_affected":"a50169a7b3ec36c8d789191b014715126e820698"}]}],"versions":["1.6","1.7","1.8","3.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15471.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}