:-)

123456789101112131415
Across
  1. 3. Flaw that occurs when untrusted data is sent to an interpreter as part of a command or query and the attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
  2. 8. Attack using poorly configured XML processors evaluate external entity references within XML documents, which can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.
  3. 9. Ericssons model to incorporate security and privacy considerations into all phases of product development.
  4. 10. Flaw that occurs when application functions related to authentication and session management are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.
  5. 11. Set of technologies designed to detect conditions indicative of a security vulnerability in an application in its running state.
  6. 12. Responsible for Ericsson product vulnerability management process, coordination of customer product security incidents and reported security issues affecting Ericsson products, solutions, and services.
  7. 15. Practice of increasing product security by reducing its attack surface.
Down
  1. 1. Cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities.
  2. 2. Recognized as a fundamental human right by the United Nations (UN) in Article 12 of the Universal Declaration of Human Rights
  3. 4. This Kubernetes Benchmark is a reference document that can be used by system administrators, security and audit professionals and other IT roles to establish a secure configuration baseline for Kubernetes.
  4. 5. Comprehensive, versatile, automated black box fuzzer that enables organizations to efficiently and effectively discover and remediate security weaknesses in software.
  5. 6. One of the world’s most popular free security tools for finding security vulnerabilities in web applications.
  6. 7. Flaw exploited to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc.
  7. 13. Software testing technique consisting of finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.
  8. 14. Set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.