Top 9: Using Components with Known Vulnerabilities

Pulled from OWASP Top 10 2017

Last updated