A programmer has allocated a 32-bit variable to store the results of an operation between two user supplied 4
byte operands.
To which of the following types of attack is this application susceptible?
A.
XML injection
B.
Command injection
C.
Integer overflow
D.
Header manipulation