Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?