{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2017-20227","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-03-28T11:44:17.954Z","datePublished":"2026-03-28T11:58:11.134Z","dateUpdated":"2026-04-01T13:59:49.724Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-28T11:58:11.134Z"},"title":"JAD 1.5.8e-1kali1 Stack-Based Buffer Overflow","descriptions":[{"lang":"en","value":"JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying overly long input that exceeds buffer boundaries. Attackers can craft malicious input passed to the jad command to overflow the stack and execute a return-oriented programming chain that spawns a shell."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Out-of-bounds Write","cweId":"CWE-787","type":"CWE"}]}],"affected":[{"vendor":"Varaneckas","product":"JAD Java Decompiler","versions":[{"version":"1.5.8e","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/42255","name":"ExploitDB-42255","tags":["exploit"]},{"url":"http://www.varaneckas.com/jad/","name":"Official Product Homepage","tags":["product"]},{"name":"VulnCheck Advisory: JAD 1.5.8e-1kali1 Stack-Based Buffer Overflow","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/jad-8e-1kali1-stack-based-buffer-overflow"}],"credits":[{"lang":"en","value":"Juan Sacco <juan.sacco@kpn.com> at KPN Red Team - http://www.kpn.com","type":"finder"}],"x_generator":{"engine":"vulncheck"},"datePublic":"2017-06-26T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-01T13:59:32.495787Z","id":"CVE-2017-20227","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-01T13:59:49.724Z"}}]}}