YoVDO

Discovering Shadow Vulnerabilities in Popular Open-Source Projects - A Journey Through Reverse-Fuzzing

Offered By: OWASP Foundation via YouTube

Tags

Vulnerability Analysis Courses Apache Cassandra Courses PyTorch Courses Prometheus Courses Software Supply Chain Security Courses Remote Code Execution Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the hidden world of "shadow vulnerabilities" in open-source libraries through a 30-minute conference talk presented by security experts Guy Kaplan and Gal Elbaz. Delve into the concept of libraries that are insecure by design and pose significant risks to organizations. Learn about a newly discovered vulnerable code pattern in a widely used open-source library and the subsequent development of a tool that analyzed over 100,000 repositories to identify and prioritize potential vulnerabilities. Examine case studies of high-profile targets like Apache Cassandra, Prometheus, and PyTorch, and understand the challenges of scaling triage, validating exploitation, and building reliable infrastructure. Gain insights into the critical remote code execution vulnerability found in Apache Cassandra and its implications for database-as-a-service providers. Discuss the responsibility gap between project owners, library owners, and users in addressing these vulnerabilities. Increase your awareness of shadow vulnerabilities and their potential impact on software security.

Syllabus

Discovering Shadow Vulnerabilities in Popular Open-Source Projects A Journey Through Reverse-Fuzzing


Taught by

OWASP Foundation

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight