A programmer has allocated a 32-bit variable to store the results of an operation between two user supplied 4
byte operands.
To which of the following types of attack is this application susceptible?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
XML injection
B.
Command injection
C.
Integer overflow
D.
Header manipulation