Tag: security
Questions Related to security
-
Program works when there is only 1 argument with program
-
Program works when there are 3 arguments with program
-
Program works when there are 4 arguments with program
-
Program never executes successfully
-
A run-time error is encountered and the program aborts
-
unsigned int variables cannot store the sign (+ or -) of the number. The sign is discarded and only the number is stored in i
-
A large positive number will be stored in i
-
Unsigned int variables cannot store signed numbers. Hence in this program i will contain garbage values.
-
1289945278
-
garbage. Integer j cannot hold such large values
-
9879879870
-
Program is aborted
-
Shell environment variables
-
Data received via encrypted network channels
-
argv[0] can only have either null or program name
-
no external input must be trusted
-
delete j;
-
realloc j;
-
free j;
-
It need not be deleted
-
DNS Spoofing
-
Command Injection
-
Path Traversal
-
Command Injection AND Path Traversal
-
XSS
-
Arc Injection
-
Buffer Overflow
-
Arc Injection AND Buffer Overflow
-
delete j
-
free j
-
it is not supposed to be deleted
-
delete [] j
-
The program should be started with root privileges. Then it should use setuid(UID) to change privileges between root and another account.
-
The program should be started with root privileges. Then it should use seteuid(UID) to change privileges between root and another account.
-
Starting the program as root is a security risk. The program should run with least privileges and obtain root using seteuid(UID) whenever necessary.
-
The program has to run with root privileges entirely. Once root privileges are dropped they cannot be regained.
-
value of tree
-
value of node
-
value of i
-
garbage-- its a dangling pointer