1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
14

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at

tacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
Computers and Technology
1 answer:
Anni [7]3 years ago
6 0

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

You might be interested in
What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
VMariaS [17]

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

6 0
3 years ago
3.5 Code Practice: Question 1 edhesive
klio [65]

Answer:

x = int(input("What grade are you in? "))

if(x == 9):

  print("Freshman")

 

elif(x == 10):

  print("Sophomore")

 

elif(x == 11):

  print("Junior")

 

elif(x == 12):

  print("Senior")

 

else:

  print("Not in High School")

Explanation:

4 0
3 years ago
write a c++ program that takes a string input from the user and removes all characters except numerals also display the number o
Xelga [282]

Answer:

hi

Explanation:

5 0
3 years ago
What types of roles are there as a webmaster?
Nuetrik [128]
<span> PHP, ASP, and Javascript. They handle the technical aspects </span>
6 0
3 years ago
Read 2 more answers
Carl is a music teacher. He builds custom computer systems for his students to use when they are learning and creating music. Ca
shutvik [7]

Answer:

um ahh <em> </em><em>badl</em><em>y</em><em> </em>

Explanation:

i really don't know the answer

4 0
3 years ago
Other questions:
  • Write the pseudocode for linear search, which scans through the sequence, looking for ν. Using a loop invariant, prove that your
    14·1 answer
  • Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
    15·1 answer
  • Search engines enable you to
    13·2 answers
  • Plagiarism occurs when writers
    14·2 answers
  • Write a program to calculate and return total surface area of a box using FUNCTION _END FUNCTION.​
    15·1 answer
  • Sulfur content is measured in
    11·1 answer
  • If you wanted to look up an article from the Chicago Tribune the best place to start would be
    7·1 answer
  • Database accessibility DBA writes subschema to decide the accessibility of database.
    13·2 answers
  • What do you mean by HDML coding ​
    13·1 answer
  • A(n) ______is like an intranet except it shares its resources with users from a distant location. Select your answer, then click
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!