The XSS vulnerability allows remote authenticated users to inject arbitrary javascript via the strMessage parameter in the login.jsp page of eClinicalWorks Population Health (CCMR) Client Portal Software. The SQL injection vulnerability allows remote authenticated users to inject arbitrary malicious database commands via the uemail parameter in the portalUserService.jsp page of the software.
This exploit creates a file called 'Crash.fax' with a payload of 2048 bytes of 'A' characters, causing the Toshiba viewer v2 p3console to crash when the file is opened. This can lead to a denial of service (DoS) condition.
There is an issue with RPC operation 126 and the imported cactirpc.dll and rwxdr.dll. It looks as if Mediasvr.exe identifies a Bad Job Handle as seen in its log file. However, the process dies when trying to send an RPC response for the bad job handle. This is caused by a null memory dereference.
This is a local exploit for a bug in ProFTPd. The bug exists in the function pr_ctrls_connect() in the file 'src/ctrls.c'. The function makes a bad call to strncpy() and allows for a buffer overflow. The vulnerability can be triggered by controlling the length of the 'socket_file' parameter passed to pr_ctrls_connect().
The vulnerability is caused due to a boundary error in the processing of a project file, which can be exploited to cause a buffer overflow when a user opens e.g. a specially crafted .DQP project file with a large array of bytes inserted in the 'Description' element. Successful exploitation could allow execution of arbitrary code on the affected machine.
There is an issue in camt70.dll when caloggerd is processing a hostname for a login operation. When processing the string, if a null is passed in as an argument, it will be loaded into ESI and then loaded into EDI in which the string processing will read a null memory location.
The _startQueue method in IOHIDLibUserClient allows an attacker to trigger a memory corruption vulnerability by manipulating the _currentEntrySize and _maxEntrySize variables. This can lead to a potential arbitrary code execution.
This exploit targets the PrecisionID Barcode ActiveX control version 1.9 in Internet Explorer 6. By sending a specially crafted input, an attacker can cause a denial of service condition. The exploit has been tested on Windows XP Professional SP2 with all patches applied and Internet Explorer 6. Other software that uses this ActiveX control may also be vulnerable.
This vulnerability allows an attacker to access sensitive information from the panic log of Apple OS X and iOS. By exploiting this vulnerability, an attacker can gain insights into the system's state and potentially discover sensitive information such as passwords, cryptographic keys, or other confidential data.
This vulnerability allows an attacker to exploit panic logs on OS X and iOS systems. By leveraging this vulnerability, an attacker can gain access to sensitive system information and potentially execute arbitrary code.