Ann is concerned that the application her team is currently developing is vulnerable to unexpected user input that could lead to issues within the memory is affected in a detrimental manner leading to potential exploitation. Which of the following describes this application threat?
A. Replay attack
B. Zero-day exploit
C. Distributed denial of service
D. Buffer overflow