| ||
Here are the components to look for:
Input, whether read from the network, a file, or from the command line
Transfer of data from said input to internal structures
Use of unsafe string handling calls
Use of arithmetic to calculate an allocation size or remaining buffer size