Source: http://cs.wellesley.edu/~cs342/spring16/handouts/format-vulnerabilities.pdf