From the course: Static Application Security Testing
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
A6: Vulnerable and outdated components - SonarQube Tutorial
From the course: Static Application Security Testing
A6: Vulnerable and outdated components
- [Instructor] The sixth set of risks in the OWASP top 10 list are flaws related to vulnerable and outdated components. This category of flaws is very closely related to security misconfigurations but with a twist. While security misconfigurations focus on applying the right security settings in your app and your app infrastructure, no amount of configuration changes to a specific component will protect your app if that component has a known vulnerability. Another differentiator is that security configurations map two business risk appetite. You might choose to apply a weaker security configuration for the sake of user convenience, or because you're already using another technology that won't work if you apply that tighter security configuration. Fixing a vulnerable component could require much more effort and come at a higher cost. Applications can easily grow to become complex ecosystems of custom code intermingled with…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
The OWASP Top 103m 26s
-
(Locked)
A1: Broken access controls6m 17s
-
(Locked)
A2: Cryptographic failures7m 29s
-
(Locked)
A3: Injection8m
-
(Locked)
A4: Insecure design5m 21s
-
(Locked)
A5: Security misconfiguration7m 58s
-
(Locked)
A6: Vulnerable and outdated components7m 8s
-
(Locked)
A7: Identification and authentication failures7m 39s
-
(Locked)
A8: Software and data integrity failures5m 49s
-
(Locked)
A9: Security logging and monitoring failures6m 55s
-
(Locked)
A10: Server-Side Request Forgery4m 58s
-
(Locked)
-