Skip main navigation


In this video, Pedro Silva will review the risk associated with using components with known vulnerabilities. Watch how to mitigate these

In this video, you will briefly review what you have learned about the risk associated with using components with known vulnerabilities, and you will then look at ways to mitigate these vulnerabilities.

In the previous video, you saw how easily a hacker could take advantage of the OWASP Juice Shop because the system included a component with a known vulnerability. In this video, you will assess the source code to identify areas with vulnerabilities and focus on what to do to reduce your system’s vulnerability.

Investigate and share: Now that you’ve completed this section, go to the OWASP Using Components with Known Vulnerabilities page to see the table mentioned in Step 3.12 Threat Analysis. Read the additional information under the table. Within the context of what you’ve learned in this section, what stands out to you as the most important aspects to keep in mind moving forward? Share your thoughts in the comments section below.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now