Downloads: 1 | Views: 132 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers | Computer Science | Turkiye | Volume 13 Issue 6, June 2024 | Popularity: 4.9 / 10
The Importance of Fixing Transitive Vulnerabilities in Java Libraries
Frolikov Evgenii
Abstract: In the context of rapidly evolving technologies, ensuring software security is becoming an increasingly relevant task. One critical aspect of this task is addressing transitive vulnerabilities in Java libraries. Transitive vulnerabilities arise when libraries depend on other libraries that contain vulnerabilities, creating a complex web of interdependencies. These vulnerabilities can be difficult to detect and pose significant risks to application security. This paper examines the causes of transitive vulnerabilities, their impact on software security, and methods for their detection and mitigation. The importance of using automated dependency analysis tools, regularly updating libraries, and maintaining strict version control is emphasized. Additionally, measures to minimize risks associated with transitive vulnerabilities are discussed, including continuous security monitoring and the implementation of best practices in software development.
Keywords: vulnerabilities, java libraries, transitive vulnerabilities, correction of transitive vulnerabilities, programming
Edition: Volume 13 Issue 6, June 2024
Pages: 1756 - 1763
DOI: https://www.doi.org/10.21275/ES24623084211
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Review Papers, Computer Science, Trinidad and Tobago, Volume 12 Issue 12, December 2023
Pages: 727 - 733Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming
Koffka Khan
Downloads: 1
Informative Article, Computer Science, India, Volume 11 Issue 3, March 2022
Pages: 1433 - 1434Cyber Attacks on SCADA Systems
Shalini
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science, India, Volume 12 Issue 4, April 2023
Pages: 1218 - 1220The Vulnerabilities, Threats and Counter measures in Wireless Network Security
Rakesh S Kale
Downloads: 2
Research Paper, Computer Science, India, Volume 10 Issue 5, May 2021
Pages: 499 - 505A Research Study on Java vs. Python Coverage of Introductory Programming Concepts
Dharunikha J P Deepthayanis
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science, Iraq, Volume 12 Issue 6, June 2023
Pages: 2581 - 2583Establishment of a Postgraduate Examination Committee System, Working under the Excel 2013 and Visual Basic Environment
Shahbaa Mohammed