Medium severity6.2NVD Advisory· Published Apr 4, 2026· Updated Apr 14, 2026
CVE-2016-20050
CVE-2016-20050
Description
NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition.
Affected products
1- cpe:2.3:a:mcafee:netschedscan:1.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.exploit-db.com/exploits/39242nvdExploitVDB Entry
- www.vulncheck.com/advisories/netschedscan-buffer-overflow-denial-of-servicenvdThird Party Advisory
News mentions
0No linked articles in our index yet.