{"id":26362,"date":"2019-03-25T20:20:44","date_gmt":"2019-03-25T20:20:44","guid":{"rendered":"http:\/\/e7661106-3ffa-4df7-8f4d-a00c83593046"},"modified":"2019-03-25T20:20:44","modified_gmt":"2019-03-25T20:20:44","slug":"which-are-the-most-insecure-languages","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/","title":{"rendered":"Which are the most insecure languages?"},"content":{"rendered":"<p>From top to bottom, technology is riddled with security errors. At the lowest level, we have hardware errors such as <a href=\"https:\/\/www.zdnet.com\/article\/security-flaws-affect-every-intel-chip-since-1995-arm-processors-vulnerable\/\">Intel&#8217;s Meltdown and Spectre bugs<\/a>. Just above those, we have programming language security holes, and boy, do we have a lot of those!<\/p>\n<p><a href=\"https:\/\/www.whitesourcesoftware.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">WhiteSource<\/a>, an open-source security company, recently did a study of open source security vulnerabilities in the seven most widely used languages over the past decade. To find the bugs, the company used it language security database. This contains data on open-source vulnerabilities from multiple sources such as the <a href=\"https:\/\/nvd.nist.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Vulnerability Database (NVD)<\/a>, security advisories, GitHub issue trackers, and open-source projects issue trackers.<\/p>\n<p>Here&#8217;s what the company found: These languages are C, Java, JavaScript, Python, Ruby, PHP, and C++. There are no surprises.&nbsp;<\/p>\n<p>There&#8217;s also no surprise as to which language had the most security bugs. That&#8217;s C, by a wide margin. Nearly 50 percent of all reported vulnerabilities were in C.<\/p>\n<p>As &nbsp;<a href=\"https:\/\/outflux.net\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kees &#8220;Case&#8221; Cook<\/a>, Google Linux kernel security engineer, said recently: &#8220;<a href=\"https:\/\/www.hpe.com\/us\/en\/insights\/articles\/making-c-less-dangerous-1808.html\" target=\"_blank\" rel=\"noopener noreferrer\">C is a fancy assembler. It&#8217;s almost machine code<\/a>.&#8221; In addition, &#8220;C comes with some worrisome baggage, undefined behaviors, and other weaknesses that lead to security flaws and vulnerable infrastructure.&#8221;<\/p>\n<p>But, WhiteSource argued, &#8220;This is <a href=\"https:\/\/resources.whitesourcesoftware.com\/blog-whitesource\/is-one-language-more-secure?utm_medium=email&amp;utm_source=topic%20optin&amp;utm_campaign=awareness&amp;utm_content=20190323%20programming%20nl&amp;mkt_tok=eyJpIjoiT0RnM09ESXlNbVF5TkRreCIsInQiOiJxRnRYRG44UTZWd1gwcUZlQU00VWsyZld0UXZtTWsxeVo3a3dhbjFZaXJCZ2tLcFF1d1ZUM2RPTytidVMyQWVkNnU4STZmMVFlMFJ3azJwcHd1Y1N4RnJFcGRoWk0rNzNuOWRjOWp5QVhRdm9CMW8zaW1yQU9Ua2t6UTk2N2NGRCJ9\" target=\"_blank\" rel=\"noopener noreferrer\">not to say that C is less secure than the other languages<\/a>. The high number of open source vulnerabilities in C can be explained by several factors. For starters, C has been in use for longer than any of the other languages we researched and has the highest volume of written code. It is also one of the languages behind major infrastructure like OpenSSL and the Linux kernel. This winning combination of volume and centrality explains the high number of known open-source vulnerabilities in C.&#8221;<\/p>\n<p>They have a point. But, having programmed and fought with C for decades now, it really is way too easy to make terrible security blunders in C. For example,&nbsp;<a href=\"https:\/\/raphlinus.github.io\/programming\/rust\/2018\/08\/17\/undefined-behavior.html\" target=\"_blank\" rel=\"noopener noreferrer\">C contains a great deal of undefined behavior<\/a>, which leaves all kinds of nasty possibilities open.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>C++, however, has the &#8220;honor&#8221; of having the most high-severity vulnerabilities in the past five years. Buffer errors, which have long plagued C, are also now being discovered often in C++.<\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/www.zdnet.com\/article\/which-are-the-most-insecure-languages\/#modal-absolute-3d285672-d81b-48aa-83fc-eb43ae9ecf2a\" data-open=\"modal\"><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/03\/25\/3d285672-d81b-48aa-83fc-eb43ae9ecf2a\/82d96b2825b9972788ba7bffd837d09c\/language-security-bugs.jpg\" class alt=\"Language Security Bugs\"><\/span><\/a><\/p>\n<p>The numbers don&#8217;t tell the full story when it comes to which language is the least, or most, secure.&nbsp;<\/p>\n<p><span class=\"credit\">(Image: WhiteSource)<\/span><\/p>\n<div class=\"modal infographic\" id=\"modal-absolute-3d285672-d81b-48aa-83fc-eb43ae9ecf2a\">\n<div class=\"modal-body\"><span class=\"img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2019\/03\/25\/3d285672-d81b-48aa-83fc-eb43ae9ecf2a\/resize\/1170x878\/54aba6bcaa26312d6004db915d717af5\/language-security-bugs.jpg\" class alt height=\"878\" width=\"1170\"><\/span><\/div>\n<\/div>\n<p>That said, <a href=\"https:\/\/www.zdnet.com\/article\/javascript-rules-but-microsoft-programming-languages-are-on-the-rise\/\">JavaScript, perhaps the most popular language<\/a>, is also the only one that saw a &#8220;<a href=\"https:\/\/www.whitesourcesoftware.com\/most-secure-programming-languages\/\" target=\"_blank\" rel=\"noopener noreferrer\">continuous rise in the number of vulnerabilities<\/a> in the past 10 years.&#8221;<\/p>\n<p>Before making too much fun of JavaScript, those results, WhiteSource points out, are misleading. Most of JavaScript&#8217;s <a href=\"https:\/\/cwe.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Common Weakness Enumeration (CWE)s<\/a> &nbsp;are <a href=\"https:\/\/www.owasp.org\/index.php\/Path_Traversal\" target=\"_blank\" rel=\"noopener noreferrer\">Path Traversal<\/a> and crypto security holes from JavaScript packages, which are barely used, maintained, or supported.<\/p>\n<p>So, why are they &#8212; and other language problems &#8212; showing up? New automated programs, such as <a href=\"https:\/\/www.owasp.org\/index.php\/Source_Code_Analysis_Tools\" target=\"_blank\" rel=\"noopener noreferrer\">Source Code Analysis Tools<\/a>, are spotting vulnerabilities, which otherwise would have been overlooked.<\/p>\n<p>The one language, which has been showing well on security holes, is &#8212; drumroll, please &#8212; Python. Yes, good old &#8212; often made fun of &#8212; Python.<\/p>\n<p>Nearly all languages share some CWEs. Two CWEs reigned supreme and featured among the three most common 70 percent of languages: <a href=\"https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_(XSS)\" target=\"_blank\" rel=\"noopener noreferrer\">Cross-Site-Scripting (XSS)<\/a>, aka&nbsp;<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/79.html\" target=\"_blank\" rel=\"noopener noreferrer\">CWE-79<\/a> and <a href=\"https:\/\/www.owasp.org\/index.php\/Improper_Data_Validation\" target=\"_blank\" rel=\"noopener noreferrer\">Input Validation<\/a>, otherwise known as <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/20.html\" target=\"_blank\" rel=\"noopener noreferrer\">CWE-20<\/a>.<\/p>\n<p>Other CWEs that show up a lot are: <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/200.html\" target=\"_blank\" rel=\"noopener noreferrer\">Information Leak\/ Disclosure (CWE-200)<\/a>, Path Traversal (CWE-22), and <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/264.html\" target=\"_blank\" rel=\"noopener noreferrer\">CWE-264 Permissions, Privileges, and Access Control<\/a>. The last is being displaced recently &nbsp;with its more specific, close relative &#8212;&nbsp;<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/284.html\" target=\"_blank\" rel=\"noopener noreferrer\">Improper Access Control (CWE-284)<\/a>.<\/p>\n<p>But is C really the worse and Python the best? WhiteSource thinks that&#8217;s much too simple a conclusion: &#8220;While the game of &#8216;my programming language is safer than yours&#8217; is certainly a fun way to pass time \u2026 &nbsp;finding the answer will probably not help you create the most innovative or secure software out there.&#8221;<\/p>\n<p>No, instead you should spend your time &#8220;staying on top of known open-source vulnerabilities and understanding the strong and weak points in the programming languages you and your team are using.&#8221;<\/p>\n<p>In the end, security is not about the languages, but how you use them.<\/p>\n<h3><strong>Related Stories:<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/which-are-the-most-insecure-languages\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WhiteSource review of programming language security errors reveal, which languages have the most security holes. The &#8220;winner?&#8221; C. But that&#8217;s only the start of the story.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26363,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-26362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Which are the most insecure languages? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which are the most insecure languages? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T20:20:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Which are the most insecure languages?\",\"datePublished\":\"2019-03-25T20:20:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/\"},\"wordCount\":701,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/\",\"name\":\"Which are the most insecure languages? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg\",\"datePublished\":\"2019-03-25T20:20:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg\",\"width\":620,\"height\":417},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Which are the most insecure languages?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Which are the most insecure languages? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/","og_locale":"en_US","og_type":"article","og_title":"Which are the most insecure languages? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-25T20:20:44+00:00","og_image":[{"width":620,"height":417,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Which are the most insecure languages?","datePublished":"2019-03-25T20:20:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/"},"wordCount":701,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/","url":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/","name":"Which are the most insecure languages? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg","datePublished":"2019-03-25T20:20:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/which-are-the-most-insecure-languages.jpg","width":620,"height":417},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/which-are-the-most-insecure-languages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Which are the most insecure languages?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26362"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26362\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26363"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}