Such vulnerabilities occur when malicious input forces a program to write data beyond allocated memory limits.| www.cysecurity.news