This document discusses buffer overflow exploits. It defines a buffer overflow as when a program overruns a buffer's boundary and overwrites adjacent memory locations. This can allow malicious code to be executed by replacing executable code. A simple C program example is provided to demonstrate this vulnerability. The document also mentions the 1988 Internet worm, which took down 10% of the Internet at the time by exploiting a buffer overflow in the finger program. Safer alternatives to vulnerable functions like gets() that cause buffer overflows are suggested.