An application is supplied with input data that exceeds the allocated memory for that data. The application is not configured to handle the excess data. What impact may the vulnerability discussed in the given scenario produce?
1)Data corruption
2) Crash or freeze of the application
3) Loss of data
4) Unauthorized access to sensitive information
5) Execution of arbitrary code
6) None of the above