Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2023-5868 CVE-2023-5869 CVE-2023-5870 CVE-2021-32027 |
CWE-ID | CWE-200 CWE-190 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system postgresql15 Operating systems & Components / Operating system package or component |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU82941
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5868
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the aggregate function calls when handling "unknown"-type arguments. A remote user can read parts of system memory.
Update the affected packages:
aarch64:Vulnerable software versions
postgresql15-private-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-static-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-15.5-1.amzn2023.0.1.aarch64
postgresql15-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-15.5-1.amzn2023.0.1.aarch64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-15.5-1.amzn2023.0.1.aarch64
postgresql15-debugsource-15.5-1.amzn2023.0.1.aarch64
noarch:
postgresql15-test-rpm-macros-15.5-1.amzn2023.0.1.noarch
src:
postgresql15-15.5-1.amzn2023.0.1.src
x86_64:
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-static-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-15.5-1.amzn2023.0.1.x86_64
postgresql15-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-15.5-1.amzn2023.0.1.x86_64
postgresql15-debugsource-15.5-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
postgresql15: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-464.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82942
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-5869
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in array modification. A remote user can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
postgresql15-private-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-static-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-15.5-1.amzn2023.0.1.aarch64
postgresql15-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-15.5-1.amzn2023.0.1.aarch64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-15.5-1.amzn2023.0.1.aarch64
postgresql15-debugsource-15.5-1.amzn2023.0.1.aarch64
noarch:
postgresql15-test-rpm-macros-15.5-1.amzn2023.0.1.noarch
src:
postgresql15-15.5-1.amzn2023.0.1.src
x86_64:
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-static-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-15.5-1.amzn2023.0.1.x86_64
postgresql15-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-15.5-1.amzn2023.0.1.x86_64
postgresql15-debugsource-15.5-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
postgresql15: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-464.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82943
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5870
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to pg_cancel_backend rolse signals background workers, including the logical replication launcher, autovacuum workers and the autovacuum launcher. A remote privileged user can abuse this behavior and perform a denial of service (DoS) attack.
Update the affected packages:
aarch64:Vulnerable software versions
postgresql15-private-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-static-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-15.5-1.amzn2023.0.1.aarch64
postgresql15-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-15.5-1.amzn2023.0.1.aarch64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-15.5-1.amzn2023.0.1.aarch64
postgresql15-debugsource-15.5-1.amzn2023.0.1.aarch64
noarch:
postgresql15-test-rpm-macros-15.5-1.amzn2023.0.1.noarch
src:
postgresql15-15.5-1.amzn2023.0.1.src
x86_64:
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-static-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-15.5-1.amzn2023.0.1.x86_64
postgresql15-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-15.5-1.amzn2023.0.1.x86_64
postgresql15-debugsource-15.5-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
postgresql15: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-464.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53231
Risk: Medium
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-32027
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow when processing certain SQL array values during array subscribing calculation. An authenticated database user can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system and can be exploited by a remote unauthenticated attacker via SQL injection vulnerability in the frontend application.
Update the affected packages:
aarch64:Vulnerable software versions
postgresql15-private-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-15.5-1.amzn2023.0.1.aarch64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-15.5-1.amzn2023.0.1.aarch64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-static-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-test-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-plpython3-15.5-1.amzn2023.0.1.aarch64
postgresql15-plperl-15.5-1.amzn2023.0.1.aarch64
postgresql15-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-15.5-1.amzn2023.0.1.aarch64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.aarch64
postgresql15-upgrade-15.5-1.amzn2023.0.1.aarch64
postgresql15-server-devel-15.5-1.amzn2023.0.1.aarch64
postgresql15-docs-15.5-1.amzn2023.0.1.aarch64
postgresql15-debugsource-15.5-1.amzn2023.0.1.aarch64
noarch:
postgresql15-test-rpm-macros-15.5-1.amzn2023.0.1.noarch
src:
postgresql15-15.5-1.amzn2023.0.1.src
x86_64:
postgresql15-upgrade-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-static-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-plperl-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-test-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-private-libs-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-15.5-1.amzn2023.0.1.x86_64
postgresql15-llvmjit-debuginfo-15.5-1.amzn2023.0.1.x86_64
postgresql15-pltcl-15.5-1.amzn2023.0.1.x86_64
postgresql15-upgrade-15.5-1.amzn2023.0.1.x86_64
postgresql15-plpython3-15.5-1.amzn2023.0.1.x86_64
postgresql15-contrib-15.5-1.amzn2023.0.1.x86_64
postgresql15-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-15.5-1.amzn2023.0.1.x86_64
postgresql15-server-devel-15.5-1.amzn2023.0.1.x86_64
postgresql15-docs-15.5-1.amzn2023.0.1.x86_64
postgresql15-debugsource-15.5-1.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
postgresql15: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2024-464.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.