OWASP Flagship Projects - OWASP Dependency-Check

OWASP Flagship Projects - OWASP Dependency-Check

OWASP Foundation via YouTube Direct link

Library Identification Problems • Development & Security use different identifiers

5 of 10

5 of 10

Library Identification Problems • Development & Security use different identifiers

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

OWASP Flagship Projects - OWASP Dependency-Check

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Software Composition Analysis
  3. 3 Primary Data Sources
  4. 4 Vulnerability Data Source • National Vulnerability Database (NVD) List of Common Vulnerability and Exposures (CVE) • Each CVE entry contains • A description of the vulnerability
  5. 5 Library Identification Problems • Development & Security use different identifiers
  6. 6 Evidence Based Identification Issues
  7. 7 Dealing with False Positives Invalid dependency identification can be resolved using a suppression file
  8. 8 Onboarding an Application
  9. 9 Use Cases for dependency-check
  10. 10 How can you help?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.