An anonymous reader quotes TechRepublic: To answer this question, the report compiled information from WhiteSource’s database, which aggregates information on open source vulnerabilities from sources including the National Vulnerability Database, security advisories, GitHub issue trackers, and popular open source projects issue trackers. Researchers focused in on open source security vulnerabilities in the seven most widely-used languages of the past 10 years to learn which are most secure, and which vulnerability types are most common in each…
The most common vulnerabilities across most of these languages are Cross-SiteScripting (XSS); Input Validation; Permissions, Privileges, and Access Control; and Information Leak / Disclosure, according to the report.
Across the seven most widely-used programming languages, here’s how the vulnerabilities were distributed:
- C (47%)
- PHP (17%)
- Java (11%)
- Python (5%)
- C++ (5%)
- Ruby (4%)
But the results are full of disclaimers — for example, that C tops the list because it’s the oldest language with “the highest volume of written code” and “is also one of the languages behind major infrastructure like Open SSL and the Linux kernel.”
The report then concludes that “the Winner Of Most Secure Programming Language is…no one and everyone…! It is not about the language itself that makes it any more or less secure, but how you use it. If you are mitigating your vulnerabilities throughout the software development lifecycle with the proper management approach, then you are far more likely to stay secure.”
Coincidentally, WhiteSource sells software which monitors open source components throughout the software development lifecycle to provide alerts about security (and licensing) issues.