Only Execution of malicious code
Uncontrolled network connections
Only Data access violations
Unauthorized access to system resources
Buffer overflows and data access violations
Only Buffer overflows
Buffer overflows and execution of malicious code