Buffer Overflow Vulnerabilities and Exploits