A server administrator notes that a legacy application often stops running due to a memory error.
When reviewing the debugging logs, they notice code being run calling an internal process to
exploit the machine. Which of the following attacks does this describe?

A.
Zero-day
B.
Buffer overflow
C.
Cross site scripting
D.
Malicious add-on