You are studying the current attack methods and find that one of your servers is vulnerable to a
Buffer
Overflow attack. Which of the following do Buffer Overflows exploit?

A.
Ramdrives
B.
A program that does not do bounds checking
C.
Memory leaks in the hardware
D.
A program allowing itself to be copied
E.
Paging of memory to a disk