Across
- 3. Statements
- 6. SQL Injection
- 7. Request Forgery
- 11. Misconfiguration
- 12. SQL Injection
- 14. Deserialization
Down
- 1. Logging and Monitoring
- 2. Sanitization
- 4. Queries
- 5. Scripting (XSS)
- 8. Injection
- 9. Data Exposure
- 10. Authentication
- 13. SQL Injection
