Related by context. Frequent words. (Click for all words.) 74 execute arbitrary commands 71 execute arbitrary code 69 Successful exploitation requires 69 via specially crafted 69 Successful exploitation 69 execute arbitrary HTML 67 injecting arbitrary SQL 67 manipulate SQL queries 65 buffer overrun 65 Successful exploitation allows 64 sending specially crafted 63 maliciously crafted 62 Cross Site Scripting 62 telnet 62 buffer overflow vulnerability 61 Buffer Overflow Vulnerability 61 Java applet 61 VBScript 61 plaintext 60 buffer overflows 59 document.write 59 iframe 59 Server Pages 59 Code Execution 59 escalated privileges 58 SQL Injection 58 exe file 58 dll 58 Java applets 58 ASP.Net 58 sandboxed 58 sudo 58 DLLs 58 servlet 57 Multiple Vulnerabilities 57 executable file 57 unpatched vulnerability 57 buffer overflow 57 rsync 56 hostname 56 site scripting XSS 56 ActiveX controls 56 ZIP files 56 filename 56 ssh 56 malicious hacker 56 autorun 56 src 55 untrusted 55 Gawker Media polls 55 scripting vulnerability 55 HTML JavaScript 55 ActiveX Control 55 remoting 55 overwrite 55 exe 55 instantiated 55 iFrame 55 webserver 55 URIs 55 NoScript 55 Security Update Fixes 55 W3C compliant 54 DLL 54 HTTP requests 54 XUL 54 ActiveX 54 specially crafted 54 XSS 54 cron 54 NET framework 54 ZIP file 54 executables 54 ActiveX control 54 usernames passwords 54 remotely exploitable 54 FTP server 54 WebDAV 54 OpenSSL 53 printf 53 executable files 53 DirectShow 53 parser 53 executable 53 sandboxing 53 MS SQL 53 DNS cache poisoning 53 LDAP 53 cause DoS Denial 53 executable code 53 SWF files 53 scriptable 53 scripting 52 SQL injection 52 Unix Linux 52 initialized 52 OpenSSH 52 logout 52 NULL 52 NTFS file 52 UTF 8