Loading…
Attending this event?
Thursday, June 27 • 2:15pm - 3:00pm
Transitive vulnerabilities exploit in real-life

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Transitive vulnerabilities are the most hated type of security issue by developers, and for a good reason: transitive dependencies are the most common source of vulnerabilities in software projects. However, yet still, only a tiny number of them are exploitable. This talk will present our research findings on quantifying the risk of known vulnerabilities in modern software applications. 


The prevalence of exploitable transitive dependencies in real-world applications. While each vulnerability may have a slight chance of exploitation, the sheer number of transitive dependencies amplifies the risk significantly. This data underscores the importance of our discussion and the need for effective strategies to mitigate these risks in your software projects.


We will present a PoC exploit for a real-world transitive dependency vulnerability and demonstrate how an attacker can compromise the application by exploiting a vulnerable transitive dependency.

We will discuss practical strategies for mitigating the risks associated with transitive dependencies and how to prioritize addressing them in your threat model.


Speakers
avatar for Adi Zlotkin

Adi Zlotkin

Open Source Security Research Manager, OX Security
A cybersecurity professional with over a decade of experience in the field. With a strong background in threat intelligence and security research.Currently serving as the Open Source Security Research Manager at OX Security, I lead a team dedicated to uncovering vulnerabilities and... Read More →
avatar for Eyal Paz

Eyal Paz

VP of Research, OX Security
Eyal Paz is the VP of Research at OX Security, a software supply chain security startup. His work includes hands-on security research toward a holistic DevSecOps solution. Before joining OX Security, Eyal spent eleven years at Check Point working on security research for product innovation... Read More →


Thursday June 27, 2024 2:15pm - 3:00pm WEST
Feedback form isn't open yet.

Attendees (1)