CVE-2016-20050 in NetSchedScaninfo

Zusammenfassung (Englisch)

NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Zuständig

VulnCheck

Reservieren

04.04.2026

Veröffentlichung

04.04.2026

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Want to stay up to date on a daily basis?

Enable the mail alert feature now!