September 27, 2022

Cmocheat Sheets

Technology application website

Manage the Risks of Software Reuse

1 min read

1.CVE-2021-44228,” Mitre, accessed Dec. 12, 2021, https://cve.mitre.org.

2. M. Sojer and J. Henkel, “Code Reuse in Open Resource Software program Progress: Quantitative Proof, Motorists, and Impediments,” Journal of the Association for Info Systems 11, no. 12 (March 2010): 868-901.

3. T. Mikkonen and A. Taivalsaari, “Software Reuse in the Era of Opportunistic Structure,” IEEE Software package 36, no. 3 (May perhaps-June 2019): 105-111.

4. D. Goodin, “Malicious NPM Packages Are Portion of a Malware ‘Barrage’ Hitting Repositories,” Ars Technica, Dec. 8, 2021, https://arstechnica.com A. Sharma, “Dev Corrupts NPM Libs ‘Colors’ and ‘Faker’ Breaking Thousands of Apps,” Bleeping Laptop or computer, Jan. 9, 2022, www.bleepingcomputer.com and A. Miller, “State of Open up Resource Safety Report 2020,” PDF file (Boston: Snyk, 2020), https://go.snyk.io.

5. T. Seals, “‘Ripple20’ Bugs Impression Hundreds of Hundreds of thousands of Related Equipment,” Threatpost, June 16, 2020, https://threatpost.com.

6. C. Soto-Valero, N. Harrand, M. Monperrus, et al., “A Thorough Research of Bloated Dependencies in the Maven Ecosystem,” Empirical Software package Engineering 26, no. 3 (March 2021): 1-44.

7. H. Solomon, “Canadian Internet sites Quickly Shut Down as Entire world Scrambles to Mitigate or Patch Log4Shell Vulnerability,” IT Entire world Canada, Dec. 13, 2021, www.itworldcanada.com.

cmocheatsheets.com © All rights reserved. | Newsphere by AF themes.