Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
Evasion attack
Denial-of-Service (DoS) attack
Ping of death attack
Buffer overflow attack
Submit