This is a critical stack-based buffer overflow vulnerability in older versions of the JAD Java Decompiler. Attackers can craft oversized malicious input that overflows the application's stack buffer, overwriting critical memory values. Successful exploitation allows attackers to execute arbitrary code with the privileges of the user running the decompiler.
Remediation
No official patch is available for this unmaintained end-of-life software. Organizations should discontinue use of the affected JAD version and replace it with an actively maintained modern Java decompiler. Remove the affected binary from all endpoint and server systems to eliminate exposure.
TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.