International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 132 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers | Computer Science | Turkiye | Volume 13 Issue 6, June 2024 | Popularity: 4.9 / 10


     

The Importance of Fixing Transitive Vulnerabilities in Java Libraries

Frolikov Evgenii


Abstract: In the context of rapidly evolving technologies, ensuring software security is becoming an increasingly relevant task. One critical aspect of this task is addressing transitive vulnerabilities in Java libraries. Transitive vulnerabilities arise when libraries depend on other libraries that contain vulnerabilities, creating a complex web of interdependencies. These vulnerabilities can be difficult to detect and pose significant risks to application security. This paper examines the causes of transitive vulnerabilities, their impact on software security, and methods for their detection and mitigation. The importance of using automated dependency analysis tools, regularly updating libraries, and maintaining strict version control is emphasized. Additionally, measures to minimize risks associated with transitive vulnerabilities are discussed, including continuous security monitoring and the implementation of best practices in software development.


Keywords: vulnerabilities, java libraries, transitive vulnerabilities, correction of transitive vulnerabilities, programming


Edition: Volume 13 Issue 6, June 2024


Pages: 1756 - 1763


DOI: https://www.doi.org/10.21275/ES24623084211



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Frolikov Evgenii, "The Importance of Fixing Transitive Vulnerabilities in Java Libraries", International Journal of Science and Research (IJSR), Volume 13 Issue 6, June 2024, pp. 1756-1763, https://www.ijsr.net/getabstract.php?paperid=ES24623084211, DOI: https://www.doi.org/10.21275/ES24623084211



Similar Articles

Downloads: 0

Review Papers, Computer Science, Trinidad and Tobago, Volume 12 Issue 12, December 2023

Pages: 727 - 733

Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming

Koffka Khan

Share this Article

Downloads: 1

Informative Article, Computer Science, India, Volume 11 Issue 3, March 2022

Pages: 1433 - 1434

Cyber Attacks on SCADA Systems

Shalini

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, India, Volume 12 Issue 4, April 2023

Pages: 1218 - 1220

The Vulnerabilities, Threats and Counter measures in Wireless Network Security

Rakesh S Kale

Share this Article

Downloads: 2

Research Paper, Computer Science, India, Volume 10 Issue 5, May 2021

Pages: 499 - 505

A Research Study on Java vs. Python Coverage of Introductory Programming Concepts

Dharunikha J P Deepthayanis

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science, Iraq, Volume 12 Issue 6, June 2023

Pages: 2581 - 2583

Establishment of a Postgraduate Examination Committee System, Working under the Excel 2013 and Visual Basic Environment

Shahbaa Mohammed

Share this Article
Top