Tag: security
Questions Related to security
unsigned char j,k; j=getchar(); k=getchar(); unsigned char result = j + k; What vulnerability is present in this code:
Which statement creates a buffer over flow? (Line numbers are marked using comments /* */)
#include
#include
#include
int main (int argc, char *argv[]) {
int i=0,j=1;
char ipstring[80];
for (;i<=3;i++){
cout<
What is the vulnerability ?
int main (int argc, char *argv[]) {
char k[3];
int i=0,j=1;
char buffer[50];
strncpy(buffer, argv[1], sizeof(buffer) - 1);
buffer[49]='/0';
unsigned char ch='a';
k[0]=1;
do{
i++;
k[i]=ch+i;
} while(i<3);
return 0;
}
Which attack(s) are possible in the below code:
Identify the name of the vulnerability exist in the below code:
1 ...
2 public class ShowUserDetailsAction extends HttpServlet
3 {
4 private String currentUser;
5 public void doPost(HttpServletRequest req, HttpServletResponse res)
6 {
7 try
8 {
9 currentUser = req.getParameter("userID");
10 RequestDispatcher rd = getServletContext().getRequestDispatcher ("/ShowDetails.jsp");
11 if (!"".equals(currentUser))
12 {
13
14 ArrayList userInfo = new ArrayList();
15 LoginDAO objLoginDAO = new LoginDAO();
16 userInfo = objLoginDAO.getUserInfo(currentUser);
17
18 if (userInfo!=null && (userInfo.size()!= 0))
19 {
20 req.setAttribute("UserInfo", userInfo);
21 }
22 else
23 {
24 req.setAttribute("NoUser", "true");
25 }
26 }
27 rd.forward(req,res);
28 } catch (Exception e)
29 {
30 log.debug(“Error Occurred:”+ e);
31 }
32 }
33 }
34 ...