TopVuln

High-risk vulnerability digests

CVE-2016-20049

  • CRITICAL

Details

CVSS v3
9.8
CVSS v4
9.3
NVD published
2026-03-28 12:16:01
Affected versions
JAD 1.5.8e-1kali1 and prior
Summary
This is a critical stack-based buffer overflow vulnerability in older versions of the JAD Java Decompiler. Attackers can craft oversized malicious input that overflows the application's stack buffer, overwriting critical memory values. Successful exploitation allows attackers to execute arbitrary code with the privileges of the user running the decompiler.
Remediation
No official patch is available for this unmaintained end-of-life software. Organizations should discontinue use of the affected JAD version and replace it with an actively maintained modern Java decompiler. Remove the affected binary from all endpoint and server systems to eliminate exposure.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.