Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 11, 2025

      Creating The “Moving Highlight” Navigation Bar With JavaScript And CSS

      June 11, 2025

      Databricks adds new tools like Lakebase, Lakeflow Designer, and Agent Bricks to better support building AI apps and agents in the enterprise

      June 11, 2025

      Zencoder launches end-to-end UI testing agent

      June 11, 2025

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025

      Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

      June 11, 2025

      Ambrosia Sky is a gorgeous science-fiction game that’s all about death, and I can’t wait to play more

      June 11, 2025

      3 secrets of PowerToys on Windows 11 that you’ll wish you already knew

      June 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      [EcjoJS Meta] Content discussion

      June 11, 2025
      Recent

      [EcjoJS Meta] Content discussion

      June 11, 2025

      Accessibility, Inclusive Design, and Universal Design Work Together

      June 11, 2025

      An “Inconceivable” Conversation With Dr. Pete Cornwell on Simple vs. Agentic AI

      June 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025
      Recent

      OpenAI CEO Sam Altman claims “ChatGPT is already more powerful than any human who has ever lived”

      June 11, 2025

      Apple Intelligence delay: A clash of two architectures and trivial AI features fell short of standards and expectations

      June 11, 2025

      Ambrosia Sky is a gorgeous science-fiction game that’s all about death, and I can’t wait to play more

      June 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Tech & Work»Azul significantly cuts down on false positives in Java vulnerability detection with latest update to Azul Intelligence Cloud

    Azul significantly cuts down on false positives in Java vulnerability detection with latest update to Azul Intelligence Cloud

    June 10, 2025

    Azul has announced an update to its Vulnerability Detection solution that promises to reduce false positives in Java vulnerability detection by up to 99% by only flagging vulnerabilities in code paths that are actually used. 

    According to Azul, typical scanners scan JAR files for components by name, rather than what the JVM actually loads.

    Erik Costlow, senior director of product management at Azul, explained because of the way Java applications work, each component contains many classes, and even though a component may be in the Common Vulnerabilities and Exposures (CVE) database, an application might not be loading the part of the component that is vulnerable. 

    “Log4j, for example, has over 10,000 classes, and there’s only like five or six of them that are actually vulnerable. So, what we find is that many people use the vulnerable things, but they use it in a safe way,” he said.

    As another example, CVE-2024-1597 describes a critical (9.8 out of 10 score) vulnerability in pgjdbc, which is a PostgreSQL JDBC driver. The vulnerability allows SQL injection if PreferQueryMode=SIMPLE is used. However, the entry in the CVE database says “Note this is not the default. In the default mode there is no vulnerability.”

    A developer can be using this component and unless they go out of their way and use PreferQueryMode=SIMPLE, they’re safe, Costlow explained. 

    “What happens is many people look at this score, and they say it’s a 10 out of 10, drop everything, dedicate my engineers to deal with this security vulnerability,” said Costlow. “But the truth is, the majority of them are using it in the default mode, in which case there’s no vulnerability. So, if I’ve taken my people off all the important work that they’re doing, and I’ve said, ‘go fix this vulnerability, patch it right now’ because it’s a critical 10 out of 10, I’ve just wasted a huge amount of time.”

    According to Costlow, this type of scenario where a developer would be using a vulnerability component, but not actually activating the part of it that is vulnerable is fairly common. 

    The latest update to Azul Vulnerability Detection uses a curated knowledge base that maps CVEs to classes that are used at runtime. The company built this by looking at the CVE database and asking how many of the components actually related to Java. Next, it went through those components and figured out what parts of them are problematic and why. 

    This curated database enables Azul to flag if one of the vulnerable classes in the CVE database is actually being used by the components in a Java application, or if the application is using other classes of a vulnerable component that aren’t considered to be vulnerable pieces. 

    “What Azul does with vulnerability detection that’s different from many of the other scanners is we continually watch that application to say, ‘did you actually use the thing?’ It’s one thing to have the vulnerable component. People have vulnerable components. There are many things that pose a risk to you, but the question is, do you actually use it in a way that poses a risk to you? What we found, is that pretty often that answer is no,” Costlow said. 

    The post Azul significantly cuts down on false positives in Java vulnerability detection with latest update to Azul Intelligence Cloud appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe state of strategic portfolio management
    Next Article Accessibility vs. Inclusive Design vs. Universal Design: Understanding the Differences

    Related Posts

    Tech & Work

    How To Prevent WordPress SQL Injection Attacks

    June 11, 2025
    Tech & Work

    Creating The “Moving Highlight” Navigation Bar With JavaScript And CSS

    June 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Indiana Jones and the Great Circle gets new skill books and better ray tracing on Xbox and PC

    Indiana Jones and the Great Circle gets new skill books and better ray tracing on Xbox and PC

    News & Updates

    CVE-2025-27528 – Apache InLong Deserialization of Untrusted Data Remote File Read Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-46726 – Langroid XMLToolMessage XML External Entity (XXE) Denial of Service (DoS) and Local File Information Exposure

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-3458 – WordPress Ocean Extra Stored Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-5167 – Assimp Out-of-Bounds Read Vulnerability

    May 26, 2025

    CVE ID : CVE-2025-5167

    Published : May 26, 2025, 4:15 a.m. | 55 minutes ago

    Description : A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as problematic. Affected by this vulnerability is the function LWOImporter::GetS0 in the library assimp/code/AssetLib/LWO/LWOLoader.h. The manipulation of the argument out leads to out-of-bounds read. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.

    Severity: 3.3 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-32472 – HPE MultiScan and picoScan Slowloris Denial-of-Service Vulnerability

    April 28, 2025

    Sam Altman says AI will make coders 10x more productive, not replace them — Even Bill Gates claims the field is too complex

    April 7, 2025

    How to Create Documentation with docs.page – A Beginner’s Tutorial

    May 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.