File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed
Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ configuration.
1212
1313The problem with using known vulnerable components was covered in a paper by
1414Jeff Williams and Arshan Dabirsiaghi titled, "[ The Unfortunate Reality of
15- Insecure Libraries] ( http ://www1.contrastsecurity .com/the-unfortunate-reality -of-insecure-libraries? & amp ; __hssc=92971330.1.1412763139545 & amp ; __hstc=92971330.5d71a97ce2c038f53e4109bfd029b71e.1412763139545.1412763139545.1412763139545.1 & amp ; hsCtaTracking=7bbb964b-eac1-454d-9d5b-cc1089659590%7C816e01cf-4d75-449a-8691-bd0c6f9946a5 ) "
15+ Insecure Libraries] ( https ://www.scribd .com/document/175866686/Aspect-Security- the-Unfortunate-Reality -of-Insecure-Libraries ) "
1616(registration required). The gist of the paper is that we as a development
1717community include third party libraries in our applications that contain well
1818known published vulnerabilities \( such as those at the
You can’t perform that action at this time.
0 commit comments