Ann is concerned that the application her team is currently developing is vulnerable to unexpected user input
that could lead to issues within the memory is affected in a detrimental manner leading to potential exploitation.
Which of the following describes this application threat?
A.
Replay attack
B.
Zero-day exploit
C.
Distributed denial of service
D.
Buffer overflow