When a specific value is supplied in USB Endpoint descriptor for a HID device, the Apple device kernel panics and reboots.
The Fullaspsite Asp Hosting (tr) website is vulnerable to SQL injection. An attacker can exploit this vulnerability to retrieve sensitive information such as admin usernames and passwords.
This module exploits a buffer overflow in Gold MP4 Player 3.3. When this application is loaded a special crafted Flash URL via File -> Open Flash URL. Buffer overflow happens and it allowing arbitrary code execution.
The vulnerability allows an attacker to perform SQL injection attacks on the target website. By manipulating the 'username' and 'token' parameters in the URL, an attacker can execute arbitrary SQL queries and retrieve sensitive information from the database. The example provided demonstrates how to obtain a player's username, password, and even the MYSQL root password.
This exploit allows an attacker to include a remote file by manipulating the 'phpbb_root_path' parameter in the 'functions.php' file of phpBB2 MODificat. By injecting a malicious URL in the 'phpbb_root_path' parameter, an attacker can execute arbitrary code on the target system.
Kyocera Mita Scanner File Utility is prone to a directory-traversal vulnerability because it fails to adequately sanitize user-supplied input. Attackers can exploit this issue to create and overwrite arbitrary files on the affected computer.
This method abuses a design weakness in iChat Bonjour services, allowing a user to conduct a denial of service attack against reachable clients by registering multiple (fake) _presence records.
This vulnerability allows an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected site. By exploiting this vulnerability, the attacker can steal cookie-based authentication credentials and launch other attacks.
This exploit allows an attacker to create a file with a large number of characters, causing a stack overflow in Dev-C++ 4.9.9.2. The exploit does not allow for arbitrary code execution, but it may be possible for a skilled attacker to modify the exploit for that purpose.
Folder Lock is prone to an information-disclosure vulnerability because it stores credentials in an insecure manner.A local attacker can exploit this issue to obtain passwords used by the application, which may aid in further attacks.