computer security attack in which a subroutine return address on a call stack is replaced by an address of a subroutine already present in executable memory, bypassing the no-execute bit
--Agreed Upon Solutions
The discussion does not exist would you like to add the first comment?