<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CVE on Maarten on IT</title><link>https://maarten.mulders.it/categories/cve/</link><description>Recent content in CVE on Maarten on IT</description><generator>Hugo</generator><language>en-us</language><copyright>&amp;copy; 2013 - 2026 Maarten Mulders</copyright><lastBuildDate>Mon, 27 Sep 2021 21:26:41 +0200</lastBuildDate><atom:link href="https://maarten.mulders.it/categories/cve/index.xml" rel="self" type="application/rss+xml"/><item><title>Automatic scan for known vulnerabilities in dependencies</title><link>https://maarten.mulders.it/2016/08/automatic-scan-for-known-vulnerabilities-in-dependencies/</link><pubDate>Tue, 30 Aug 2016 15:30:40 +0200</pubDate><guid>https://maarten.mulders.it/2016/08/automatic-scan-for-known-vulnerabilities-in-dependencies/</guid><description>&lt;p&gt;When using third-party components (be it open source or not), we all know it&amp;rsquo;s a good practice to keep your frameworks and libraries up to date.
This is also one of the spearhead in the &lt;a href="https://www.owasp.org/index.php/Top_10_2013-Top_10"&gt;OWASP Top 10 (2013 edition)&lt;/a&gt;: &lt;a href="https://www.owasp.org/index.php/Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities"&gt;A9 - Using Components with Known Vulnerabilities&lt;/a&gt;.
To help you assess your projects status with regard to this, OWASP.org developed the tool &lt;a href="https://www.owasp.org/index.php/OWASP_Dependency_Check"&gt;Dependency Check&lt;/a&gt;.
This tool is primarily intended code bases in Java, .NET, Ruby, Node.js, and Python.
Integration with various build tools is also provided for.&lt;/p&gt;</description></item></channel></rss>