Vulnerabilities / Threats
7/31/2007
09:25 AM
50%
50%

Report: Rise in Web App Vulnerabilities

Cenzic released its Application Security Trends Report - Q2 2007

SANTA CLARA, Calif. -- Cenzic Inc., the innovative leader of application vulnerability assessment and risk management solutions, today released its Application Security Trends Report - Q2 2007, proving once again that organizations are failing to optimize their Web application security methods. While this report highlights the Top 10 vulnerabilities from published reports in Q2 2007, Cenzic estimates there are thousands of vulnerabilities that remain unpublished due to the lack of reports and the vast amounts of home grown applications. It is estimated that there are more than 100 million Web applications that facilitate transactions and collection information, yet less than five percent of applications are tested for vulnerabilities. The report provides a thorough analysis of reported vulnerabilities, Web application probes, attack statistics and key findings.

"We are at a critical stage when it comes to securing Web applications. With less than one percent of applications tested, millions of applications are vulnerable and ripe for hackers," said Mandeep Khera, VP of marketing for Cenzic. "Even the organizations that do test are still focused on testing only the applications in the development or Quality Assurance stage. With 99 percent of the applications in the production stage at any given point, these corporations are extremely exposed and vulnerable. They will get hacked. It's not a question of if but when."

"Our analysis for Q2 illustrates a very high percentage of published vulnerabilities in Web technologies, similar to the Q1 findings. This is a clear indication that network security is maturing, while application security is in its early stages," said Tom Stracener, senior security analyst at Cenzic. "While our analysis shows top vulnerabilities in Java, Apache, Apple and PHP applications, these reflect only the published vulnerabilities. There still remain thousands of vulnerabilities that are not published or reported."

Cenzic Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: nice one good
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas in a thought-provoking discussion about the evolving role of the CISO.