What vulnerability occurs when data is written beyond the memory areas allocated to an application?
- Buffer overflow
- Access control problems
- Race conditions
- Weaknesses in security practices
- Non-validated input
Exam with this question: Introduction to Cybersecurity: Course Final Exam
Please login or Register to submit your answer