


Perceptive Security
SOC/SIEM Consultancy

JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying oversized input th…
Published:
27 March 2026 at 23:00:00
Alert date:
28 March 2026 at 13:07:27
Source:
nvd.nist.gov
Security Tools
JAD version 1.5.8e-1kali1 and prior versions contain a critical stack-based buffer overflow vulnerability (CVE-2016-20049) that enables remote code execution. Attackers can exploit this flaw by providing malicious input strings exceeding 8150 bytes, which overflow the stack buffer and overwrite return addresses. This allows attackers to execute arbitrary shellcode within the application context. The vulnerability affects the Java decompiler JAD and has publicly available exploit code. Organizations using affected versions should upgrade immediately to prevent potential compromise.
Technical details
Mitigation steps:
Affected products:
JAD
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2016-20049
http://www.varaneckas.com/jad/
https://www.exploit-db.com/exploits/42076
https://www.vulncheck.com/advisories/jad-8e-1kali1-stack-based-buffer-overflow-remote-code-execution
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
