Which of the following attacks is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle?
Buffer overflow attack
Time-of-check to time-of-use attack
Data diddling
Smurf attack