Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mcafee
Mcafee netschedscan |
|
| CPEs | cpe:2.3:a:mcafee:netschedscan:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Mcafee
Mcafee netschedscan |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foundstone
Foundstone netschedscan |
|
| Vendors & Products |
Foundstone
Foundstone netschedscan |
Mon, 06 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition. | |
| Title | NetSchedScan 1.0 Buffer Overflow Denial of Service | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T16:43:56.885Z
Reserved: 2026-04-04T13:29:58.990Z
Link: CVE-2016-20050
Updated: 2026-04-06T16:43:33.827Z
Status : Analyzed
Published: 2026-04-04T14:16:16.317
Modified: 2026-04-14T19:03:37.050
Link: CVE-2016-20050
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:30:09Z