A company hosts a web-based application that is accessed by customers worldwide. A code review has discovered known vulnerabilities in the company's server application, which is made up of several supporting libraries and uses the following requirements:
Additionally, Python imports are requirements.txt file with the following content:
Given the critical nature of the application, which of the following actions should the company take to address the vulnerabilities?
Currently there are no comments in this discussion, be the first to comment!