GIAC GSEC Question Answer
A program has allocated 10 characters of space for user’s response on a form. The application does not validate the number of characters that a user can input into the field before accepting the data. Which type of attack Is the application vulnerable to?