{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T18:40:57.999","vulnerabilities":[{"cve":{"id":"CVE-2020-7466","sourceIdentifier":"secteam@freebsd.org","published":"2020-10-06T14:15:13.243","lastModified":"2024-11-21T05:37:12.073","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The PPP implementation of MPD before 5.9 allows a remote attacker who can send specifically crafted PPP authentication message to cause the daemon to read beyond allocated memory buffer, which would result in a denial of service condition."},{"lang":"es","value":"La implementación PPP de MPD versiones anteriores a 5.9, permite a un atacante remoto que puede enviar un mensaje de autenticación PPP específicamente diseñado causar que el demonio lea más allá del búfer de memoria asignado, lo que resultaría en una condición de denegación de servicio"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secteam@freebsd.org","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mpd_project:mpd:*:*:*:*:*:*:*:*","versionEndExcluding":"5.9","matchCriteriaId":"1B163FDA-5474-4EAB-8DA3-54F83A4E8319"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.3.17","matchCriteriaId":"697F15F6-AED1-4013-A06D-BDF26622B1D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:stormshield:stormshield_network_security:4.4.0:*:*:*:*:*:*:*","matchCriteriaId":"5DDEAFC4-01D3-42B0-A9DC-DE19B63F182B"}]}]}],"references":[{"url":"https://sourceforge.net/p/mpd/bugs/69/","source":"secteam@freebsd.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://sourceforge.net/p/mpd/svn/2374/","source":"secteam@freebsd.org","tags":["Patch","Third Party Advisory"]},{"url":"https://sourceforge.net/p/mpd/bugs/69/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://sourceforge.net/p/mpd/svn/2374/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}