<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Business Yield Technology</provider_name><provider_url>https://businessyield.com/tech</provider_url><title>Buffer Overflow: Definition, Attacks, Types &amp; More</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yRTEqzOWUS"&gt;&lt;a href="https://businessyield.com/tech/technology/buffer-overflow/"&gt;Buffer Overflow: Definition, Attacks, Types &amp; More&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://businessyield.com/tech/technology/buffer-overflow/embed/#?secret=yRTEqzOWUS" width="600" height="338" title="&#x201C;Buffer Overflow: Definition, Attacks, Types &amp; More&#x201D; &#x2014; Business Yield Technology" data-secret="yRTEqzOWUS" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>http://businessyield.com/tech/wp-content/uploads/sites/2/2023/12/Untitled-design-18.jpg</thumbnail_url><thumbnail_width>500</thumbnail_width><thumbnail_height>250</thumbnail_height><description>The application overwrites nearby memory locations in the process of trying to copy the data to the buffer. In this article, we will look at buffer overflow attack, types, and vulnerability.</description></oembed>
