Computer security
Buffer overflow
Heap overflow
Circular buffer
Integer overflow
Vulnerability
Code injection
Pointer
Stack overflow
Computing
Software bugs
Cyberwarfare