December 2017
Intermediate to advanced
364 pages
7h 30m
English
Most of the developers use third-party libraries while developing applications, and it's very common to see using open source plugins and modules inside their code. Many of the open source projects might be vulnerable to known attacks such as Cross-Site Scripting and SQL injection. If developers don't know the vulnerability that exists in the library they use, that means their entire application becomes vulnerable the attacker because of a bad library.
So dependency checks will allow us to find using components with known vulnerabilities (OWASP A9) issues in application code by scanning the libraries against the CVE and NIST vulnerability database.
There are multiple projects out there in the market for performing ...