← Back to CVEs
CVE-2016-20050
MEDIUM6.2
Description
NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition.
CVE Details
CVSS v3.1 Score6.2
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/4/2026
Last Modified4/4/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-787
References
https://www.exploit-db.com/exploits/39242(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/netschedscan-buffer-overflow-denial-of-service(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.