Which of the following are examples of vulnerabilities?
A. SQL injection
B. Command injection
C. Cross-site scripting (XSS)
D. Cross-site request forgery (CSRF)
Which of the following are examples of vulnerabilities?
A. SQL injection
B. Command injection
C. Cross-site scripting (XSS)
D. Cross-site request forgery (CSRF)