International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers | Computer Science | Turkiye | Volume 13 Issue 6, June 2024 | Popularity: 4.9 / 10


     

The Importance of Fixing Transitive Vulnerabilities in Java Libraries

Frolikov Evgenii


Abstract: In the context of rapidly evolving technologies, ensuring software security is becoming an increasingly relevant task. One critical aspect of this task is addressing transitive vulnerabilities in Java libraries. Transitive vulnerabilities arise when libraries depend on other libraries that contain vulnerabilities, creating a complex web of interdependencies. These vulnerabilities can be difficult to detect and pose significant risks to application security. This paper examines the causes of transitive vulnerabilities, their impact on software security, and methods for their detection and mitigation. The importance of using automated dependency analysis tools, regularly updating libraries, and maintaining strict version control is emphasized. Additionally, measures to minimize risks associated with transitive vulnerabilities are discussed, including continuous security monitoring and the implementation of best practices in software development.


Keywords: vulnerabilities, java libraries, transitive vulnerabilities, correction of transitive vulnerabilities, programming


Edition: Volume 13 Issue 6, June 2024


Pages: 1756 - 1763




Text copied to Clipboard!
Frolikov Evgenii, "The Importance of Fixing Transitive Vulnerabilities in Java Libraries", International Journal of Science and Research (IJSR), Volume 13 Issue 6, June 2024, pp. 1756-1763, https://www.ijsr.net/getabstract.php?paperid=ES24623084211

Similar Articles

Downloads: 2

Research Paper, Computer Science, India, Volume 10 Issue 5, May 2021

Pages: 499 - 505

A Research Study on Java vs. Python Coverage of Introductory Programming Concepts

Dharunikha J P Deepthayanis

Share this Article

Downloads: 2

Masters Thesis, Computer Science, Nigeria, Volume 10 Issue 10, October 2021

Pages: 29 - 32

Illustration of Safe and Unsafe State Using Transition Table and Java Simulation

October Lambert Kekebou Erefaghe

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science, Iraq, Volume 12 Issue 6, June 2023

Pages: 2581 - 2583

Establishment of a Postgraduate Examination Committee System, Working under the Excel 2013 and Visual Basic Environment

Shahbaa Mohammed

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science, India, Volume 11 Issue 8, August 2022

Pages: 1099 - 1105

Analysis of Financial Market Forecasting using Long Short-Term Memory (LSTM)

Ninad Dani

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Masters Thesis, Computer Science, Mexico, Volume 10 Issue 8, August 2021

Pages: 1164 - 1166

Implementation of a Progressive Web Application to Access the Backend Developed in Django: Experience in his Development for File System Information in Legal Matters

Lic. Jose NestorMeneses Garcia, M.C. Juan Ramos Ramos, M.C. Elizabeth Cuatecontzi Cuahutle, Dr. Jose Juan Hernandez Mora

Share this Article
Top