Buffer overflows are a type of attack aimed at a common flaw in the way software is written. If the application isn’t written correctly, the visitor might be able to input a bunch of gibberish that would fill up the available buffer space, and then “spill over” outside the buffer. Clever attackers include system commands in that spill-over, and the computer may execute those commands since the input is no longer going into the password buffer.Next read this article on the vulnerability of software vulnerabilities.”]
Source: https://www.csoonline.com/article/2117380/buffer-overflow.html

