Description

It is possible to make the system read data before or beyond the intended buffer.

Impact

Get access to the system and get control of the server.

Recommendation

- Implement good security practices in the software development life cycle. - Disable de unsafe functions in the system.

Threat

External attacker with access to the application.

Expected Remediation Time

⏱️ 60 minutes.