Question: 99
In the context of load balancing with affinity, which of the...
A fintech company recently experienced a security breach where attackers exploited a vulnerability in their customer-facing web application, leading to unauthorized access to sensitive financial data. Upon investigation, the security team discovered that the attackers injected malicious code by sending oversized input to a specific input field, which allowed them to overwrite the application's memory and execute arbitrary commands. The application is written in C++ and utilizes several third-party libraries for handling user inputs.
The attackers most likely used which type of buffer overflow attack to compromise the system?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!