• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Programming

Java Applications: A Frontrunner for Vulnerabilities, Report Reveals

Paul Balo by Paul Balo
October 20, 2016
in Programming
Share on FacebookShare on Twitter

Massachusetts-based security firm, Veracode, recently unveiled its annual State of Software Security Report for 2016 . A significant takeaway from the report lies in the fact that software development’s open-source components account for a substantial proportion of security vulnerabilities. The report is grounded on an extensive study encompassing over 300,000 assessments performed on enterprise applications over 18 months.

In the labyrinth of programming languages, Java emerged at the forefront with 97% of applications written in it found to harbor at least one vulnerability. These vulnerabilities, which range from severe to low-grade, stem from their component parts, i.e., bits of code that developers utilize to pen software. Consequently, 25% of all Java applications reportedly possess a known vulnerable component playing a substantial role in Java’s high vulnerability ratings.

Interestingly, Java, a product of Sun Microsystems in 1995 initially, was subsequently taken over by Oracle, post their 2009 acquisition of the initial company. Java has developed a notoriety for its inherent security flaws, prompting a series of frequent security patches.

Chris Wysopal, co-founder and chief technology officer of Veracode, alerted Fortune to the impending danger residing in code components. He stated, “there’s a danger in code components being reused throughout many applications without developers necessarily realizing it…a lot of risk is inherited, and people don’t know, because it’s two steps removed.”

The report also highlights that information leakage at 72% and cryptographic issues at 65% stand as the main sources of vulnerabilities.

It’s not all doom and gloom, though. The report lauded corporate developers for their improvement in delivering secure applications. However, third-party developers are not keeping pace, exhibiting a deteriorating performance. This performance divide draws a stark contrast between in-house developed applications, which passed the industry benchmark 39% of the time (a rise from 37% last year), and third-party developed applications achieving a mere 25% pass rate, a drop from 28% last year.

Occasionally, these software disparities force companies to insource application maintenance, deeming vendor costs exorbitant. Moreover, some vendors, having received their payment, may not display the same dedication towards routine application updates.

Interestingly, the health sector shows the lowest vulnerability fix rate across the industries, a fact that poses immense concern according to the report. A common assumption might be that tech wizards, i.e., security professionals, would top the fix rate. However, the report indicates that only about one-third of flaws get rectified by security experts. On the other hand, the manufacturing industry leads the pack, managing to fix two-thirds of known/reported flaws efficiently.

In conclusion, the report offers food for thought for enterprises relying on vulnerable platforms like Java, pressing the need for constant updates and security checks. The lessons learned here offer a road map towards better software development practices and more secure enterprise applications.

Related Posts:

  • google-intel-confidential-computing-more-s.max-2000×2000
    Google Cloud Reported More Than 10 Bugs On Intel’s…
  • 020tYFWBL4Yz8jIIFUdKDR1-22
    A Fix to Microsoft Windows Defender And Security Flaws
  • blog5f352fc3b2393_wp
    Hackers Exploit Popular WordPress Backup Tool Used…
  • newFile-4
    Dorsey Says Bitchat Software Lacks Security Review
  • Nigeria Bureau of Statistics Data breach
    Hackers Compromised The NBS Sever, But No Ransomware Yet
  • Screenshot-513-e1718290879733-920×513
    Apple Password App Security Flaw Exposed Users to…
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: appapplicationcyber securitydeveloperjavaprogrammingresearchsecurity
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Microsoft Fixes Windows Certificate Enrolment Bug September 1, 2025
  • Microsoft to Enforce MFA on Azure Resource Management in October September 1, 2025
  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025
  • Threads Tests Long-Form Text Sharing Feature August 29, 2025
  • WhatsApp Tests AI to Rephrase Messages and Adjust Tone August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.