以下是从网页截图中获取到的关于漏洞的关键信息: CVE编号: CVE-2017-20016 Vulnerability ID: VDB-101974, ID 101969 CVSS Meta Temp Score: 5.3 Current Exploit Price: $0-$5k CTI Interest Score: 0.00 Summary A vulnerability described as problematic has been identified in WEKA INTEREST Security Scanner up to 1.8. This issue affects some unknown processing of the component Portscan. Executing manipulation can lead to memory allocation. This vulnerability only affects products that are no longer supported by the maintainer. The identification of this vulnerability is CVE-2017-20016. The attack may be launched remotely. Furthermore, there is an exploit available. It is suggested to use an alternative component instead of the affected one. Details A vulnerability has been found in WEKA INTEREST Security Scanner up to 1.8 (Security Testing Software) and classified as problematic. This vulnerability affects an unknown code block of the component Portscan. The manipulation with an unknown input leads to a memory allocation vulnerability. The CWE definition for the vulnerability is CWE-789. The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated. As an impact it is known to affect availability. The bug was discovered 07/30/2007. The weakness was shared 06/05/2017 by Marc Ruef with scip AG as ID 101969 as confirmed entry (VulDB). The advisory is available at vuldb.com. The vendor was not involved in the coordination of the public release. The entry contains: The Attack Tool Kit (ATK) is an exploiting framework published under GPL3. Back in 2006 there was a legal dispute between the developer Marc