With a successful format string attack against the web application, the attacker is able to …
Read only certain memory areas using the %s token
Write only certain areas using other tokens
Read and write to memory at will
None of the above