top of page
perceptive_background_267k.jpg

JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying oversized input th…

Published:

27 March 2026 at 23:00:00

Alert date:

28 March 2026 at 13:07:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

JAD version 1.5.8e-1kali1 and prior versions contain a critical stack-based buffer overflow vulnerability (CVE-2016-20049) that enables remote code execution. Attackers can exploit this flaw by providing malicious input strings exceeding 8150 bytes, which overflow the stack buffer and overwrite return addresses. This allows attackers to execute arbitrary shellcode within the application context. The vulnerability affects the Java decompiler JAD and has publicly available exploit code. Organizations using affected versions should upgrade immediately to prevent potential compromise.

Technical details

Mitigation steps:

Affected products:

JAD

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page