Security Applications: Bounds Checking Application Vulnerabilities

Describe the buffer overflow application vulnerability and identify what type(s) of applications this vulnerability affects.