Attackers use buffer overflows to damage the execution stack of web ... in effect conveying new instructions to the attacked computer.