Watch this video on YouTube
Which type of attack exploits the unchecked assumptions the system makes about its inputs?