Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?
Virus
Buffer overflow ρ
System vulnerabilities
Port scan
Submit