Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
MATLAB Memory Corruption Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
MATLAB
by:
Unknown
7.5
CVSS
HIGH
Memory Corruption
Unknown
CWE
Product Name: MATLAB
Affected Version From: MATLAB R2009b
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

MATLAB Memory Corruption Vulnerability

MATLAB is prone to a memory-corruption vulnerability because the software fails to properly bounds-check data used as an array index. Attackers may exploit this issue to execute arbitrary code within the context of affected applications.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/37688/info

MATLAB is prone to a memory-corruption vulnerability because the software fails to properly bounds-check data used as an array index.

Attackers may exploit this issue to execute arbitrary code within the context of affected applications.

MATLAB R2009b is affected; other versions may also be vulnerable. 

cxib=0.<?php echo str_repeat("1",296450); ?>