A programmer has allocated a 32 bit variable to store the results of an operation between two user
supplied 4 byte operands. To which of the following types of attack is this application susceptible?

A.
XML injection
B.
Command injection
C.
Integer overflow
D.
Header manipulation