Главная
Study mode:
on
1
Intro
2
Software Composition Analysis
3
Primary Data Sources
4
Vulnerability Data Source • National Vulnerability Database (NVD) List of Common Vulnerability and Exposures (CVE) • Each CVE entry contains • A description of the vulnerability
5
Library Identification Problems • Development & Security use different identifiers
6
Evidence Based Identification Issues
7
Dealing with False Positives Invalid dependency identification can be resolved using a suppression file
8
Onboarding an Application
9
Use Cases for dependency-check
10
How can you help?
Description:
Explore OWASP Dependency-Check, a flagship project of the OWASP Foundation, in this 29-minute conference talk presented by Jeremy Long. Dive into the world of Software Composition Analysis and learn about primary data sources, including the National Vulnerability Database (NVD) and Common Vulnerability and Exposures (CVE) list. Understand the challenges in library identification, evidence-based identification issues, and strategies for dealing with false positives. Discover how to onboard an application and various use cases for dependency-check. Gain insights into vulnerability data sources and their importance in identifying security risks in software dependencies. Learn how to contribute to this open-source project and enhance the security of your applications.

OWASP Flagship Projects - OWASP Dependency-Check

OWASP Foundation
Add to list