A programmer allocates 16 bytes for a string variable, but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
A.
Buffer overflow
B.
Cross-site scripting
C.
Session hijacking
D.
Directory traversal