Describe the buffer overflow application vulnerability and identify what type(s) of applications this vulnerability affects.
Security Applications: Bounds Checking Application Vulnerabilities Describe the buffer overflow application vulnerability and identify what type(s) of applications this vulnerability affects.