[70][71] For example, a standard system is exploitation of the buffer overrun vulnerability, exactly where software program made to shop facts inside a specified area of memory doesn't prevent far more details as opposed to buffer can accommodate from becoming provided. Malware may well offer facts that overflows the buffer, with malicious executab