This sample code is vulnerable to which of the following attacks? Select all that apply.