What are three threats to a vulnerable application during a buffer overflow attack? (Choose three.)