[70][seventy one] One example is, a common process is exploitation of the buffer overrun vulnerability, exactly where software built to retailer data inside of a specified area of memory does not protect against much more facts compared to the buffer can accommodate from staying equipped. Malware may possibly provide info that overflows the buffer,