which of the following types of attack is this application susceptible?

A programmer has allocated a 32 bit variable to store the results of an operation between two user
supplied 4 byte operands. To which of the following types of attack is this application susceptible?

A programmer has allocated a 32 bit variable to store the results of an operation between two user
supplied 4 byte operands. To which of the following types of attack is this application susceptible?

A.
XML injection

B.
Command injection

C.
Integer overflow

D.
Header manipulation



Leave a Reply 0

Your email address will not be published. Required fields are marked *

1 × 1 =