CVE-2016-20050 in NetSchedScan
Summary
NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Responsible
VulnCheck
Reservation
04/04/2026
Disclosure
04/04/2026
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 355362 | Foundstone NetSchedScan out-of-bounds write | 787 | Proof-of-Concept | Not defined | CVE-2016-20050 |