Top 9: Using Components with Known Vulnerabilities

Pulled from OWASP Top 10 2017

What is it?

How to Prevent

Example Attack Scenarios

Last updated