{"id":9815,"date":"2018-08-17T07:01:01","date_gmt":"2018-08-17T07:01:01","guid":{"rendered":"http:\/\/808985f1-dd27-4c4e-ba3b-f635830c9a9e"},"modified":"2018-08-17T07:01:01","modified_gmt":"2018-08-17T07:01:01","slug":"open-source-vulnerabilities-which-will-not-die-who-is-to-blame","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/","title":{"rendered":"Open-source vulnerabilities which will not die: Who is to blame?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/08\/16\/241c1027-cabd-4089-993f-468a0ffd3ee7\/thumbnail\/770x578\/89ede61aa60dead834c01dce105a1078\/screen-shot-2018-08-16-at-12-53-19.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><a href=\"https:\/\/www.zdnet.com\/topic\/open-source\/\">Open-source<\/a> technologies are found in popular services offered by the largest technology and Internet companies worldwide.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>An audit <a href=\"https:\/\/www.zdnet.com\/article\/enterprise-codebases-plagued-by-open-source-vulnerabilities\/\">conducted by Black Duck software<\/a> estimates that 96 percent of commonly-used applications in the enterprise utilize open-source components.<\/p>\n<p>Open-source projects are critical to the fabric of modern-day software and talented developers by the thousands give up their time to create software and critical components that we all use today.<\/p>\n<p>However, the nature of <a href=\"https:\/\/www.zdnet.com\/article\/hackerone-gives-professional-services-away-for-free-to-open-source-projects\/\">open-source software<\/a> can allow for vulnerabilities and bugs to go unnoticed, sometimes for decades.<\/p>\n<p>Various bug bounty programs, such as <a href=\"https:\/\/www.google.com\/about\/appsecurity\/patch-rewards\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Patch Rewards<\/a>, have been running for years but problems can still slip through the net.<\/p>\n<p>Not all open-source bugs are created equally. A sexy name and promises of doom to any software which relies upon open-source components &#8212; such as libraries &#8212; have been used previously simply for publicity by some companies.<\/p>\n<p>As reported by ZDNet&#8217;s Steven J. Vaughan-Nichols, the case of <a href=\"https:\/\/www.zdnet.com\/article\/bogus-linux-vulnerability-gets-publicity\/\">GoSecure and the &#8220;Chaos&#8221; bug<\/a> could be included in the list, as the &#8220;vulnerability&#8221; required brute-forcing credentials in the outset, which is only possible when weak or lax passwords are in use.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>However, there are still cases in which open-source systems and the overlay software depending on them are placed at real risk.<\/p>\n<p>Equifax, for example, has <a href=\"https:\/\/www.zdnet.com\/article\/equifax-blames-open-source-software-for-its-record-breaking-security-breach\/\">blamed the use of open-source<\/a> components as the reason the firm became the victim of a data breach resulting in the exposure of <a href=\"https:\/\/www.equifaxsecurity2017.com\/2017\/10\/02\/equifax-announces-cybersecurity-firm-concluded-forensic-investigation-cybersecurity-incident\/\" target=\"_blank\" rel=\"noopener noreferrer\">145.5 million US records<\/a>.<\/p>\n<p>Names, social security numbers, birthdates, and home addresses, as well as partial driving license details, may have been stolen.<\/p>\n<p>This vulnerability believed to be at fault was in Apache Struts.<\/p>\n<p>In response to Equifax&#8217;s claims, the Apache Struts Project Management Committee said the attackers &#8220;either used an earlier announced vulnerability on an unpatched Equifax server or exploited a vulnerability not known at this point in time &#8212; a so-called zero-day exploit.&#8221;<\/p>\n<p>It turned out to be the former. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5638\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2017-5638<\/a> was identified and disclosed by US CERT and patched two months before the data breach took place.<\/p>\n<p>However, Equifax did not update its systems.<\/p>\n<p>When open-source vulnerabilities make the news, it is often the case that the software itself is not at fault; but rather, organizations are failing to maintain patch processes which resolve critical vulnerabilities in a reasonable timeframe &#8212; or due to a lack of understanding, they may not know which open-source components are in use.<\/p>\n<p><strong>See also: <a href=\"https:\/\/www.zdnet.com\/article\/enterprise-codebases-plagued-by-open-source-vulnerabilities\/\">Open-source vulnerabilities plague enterprise codebase systems<\/a><\/strong><\/p>\n<p>The Equifax debacle highlighted the importance of keeping systems up-to-date, but there are other open-source bugs which are being left unresolved, too, to the detriment of companies worldwide.<\/p>\n<p><a href=\"http:\/\/heartbleed.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HeartBleed<\/a>, <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-098A\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2014-0160<\/a>, is an extremely dangerous security hole in OpenSSL. The vulnerability was discovered in OpenSSL 1.01 in 2014, which at the time was used by an estimated two-thirds of all secured websites.<\/p>\n<p>OpenSSL acted as a default open-source code library for Apache and NGINX web servers. The HeartBleed security flaw allows attackers to remotely expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling.<\/p>\n<p>A patch was released on April 7, 2014. As of 2017, this vulnerability was still present in close to 200,000 servers worldwide.<\/p>\n<p><strong>See also: <a href=\"https:\/\/www.zdnet.com\/article\/how-to-recover-from-heartbleed\/\">How to recover from Heartbleed<\/a><\/strong><\/p>\n<p>Another player from 2014 is ShellShock, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2014-6271\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2014-6271<\/a>, a bug which has been present in Bash for over two decades and has the potential to open up Unix, Linux, and Mac servers to severe attacks.<\/p>\n<p>Successful exploitation of the bug &#8212; which scored a perfect <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-7169\" target=\"_blank\" rel=\"noopener noreferrer\">CVSS score of 10<\/a> &#8212; in the wild included reports from cybersecurity professionals who observed the execution of payloads including malware droppers, reverse shells and backdoors, data exfiltration, and distributed denial-of-service (DDoS) attacks.<\/p>\n<p>ShellShock is still considered a problem, even today. The reason? According to <a href=\"https:\/\/securityintelligence.com\/cheap-shock-why-shellshock-is-still-a-thing\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM X-Force<\/a> researchers, it is a &#8220;very cheap attack&#8221; as it only requires basic programming skills &#8212; and some servers are still vulnerable, despite a patch being available for years.<\/p>\n<p>Decrypting RSA with Obsolete and Weakened eNcryption (<a href=\"https:\/\/drownattack.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Drown<\/a>), <a href=\"https:\/\/www.zdnet.com\/article\/dont-let-your-openssl-secured-web-sites-drown\/\">first made public in 2016<\/a>, is an OpenSSL vulnerability which utilizes a deprecated security protocol, Secure Sockets Layer (SSLv2), to attack websites, break encryption and steal sensitive information.<\/p>\n<p><strong>TechRepublic: <a href=\"https:\/\/www.techrepublic.com\/article\/8-hurdles-it-must-overcome-if-they-want-open-source-success\/\" target=\"_blank\" rel=\"noopener noreferrer\">8 hurdles IT must overcome if they want open source success<\/a><\/strong><\/p>\n<p>At the time of discovery, it was estimated that Drown could hijack close to 30 percent of all HTTPS servers &#8212; which was believed to be roughly 11 million websites. Yahoo, Sina, and Alibaba were among those found to be vulnerable.<\/p>\n<p>Servers which still have SSLv2 enabled are still vulnerable to attack.<\/p>\n<p>Open-source components are found in many services and systems and without them, we would not be as technologically advanced as we are today.<\/p>\n<p>However, there are latent vulnerabilities which, when made public, require companies to scour their systems to find out if they are using particular components, and if so, patch them quickly.<\/p>\n<p>As the <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">average cost of a data breach<\/a> has now reached $3.86 million, the effort is worth it.<\/p>\n<p>According to a <a href=\"https:\/\/snyk.io\/stateofossecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">recent Snyk survey<\/a>, 69 percent of Red Hat Linux vulnerabilities are fixed within a day of public disclosure, and 90 percent were fixed within 14 days.<\/p>\n<p>However, only 25 percent of open-source code maintainers notify users of vulnerabilities and only 10 percent file a CVE, according to the research.<\/p>\n<p>The Equifax incident was due to a bug which was patched, exploits surfaced only days later, and within two months, this caused one of the biggest data breaches to date. This should serve as a reminder for both open-source developers and companies taking advantage of open-source components that security is not the responsibility of just one or the other &#8212; but rather, it must be a collaborative effort.<\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/critical-open-source-vulnerabilities-which-simply-will-not-die\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Major open-source vulnerabilities have wreaked havoc and caused heartache for IT admins worldwide.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":9816,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-9815","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Open-source vulnerabilities which will not die: Who is to blame? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open-source vulnerabilities which will not die: Who is to blame? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-17T07:01:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Open-source vulnerabilities which will not die: Who is to blame?\",\"datePublished\":\"2018-08-17T07:01:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/\"},\"wordCount\":945,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/\",\"name\":\"Open-source vulnerabilities which will not die: Who is to blame? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg\",\"datePublished\":\"2018-08-17T07:01:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open-source vulnerabilities which will not die: Who is to blame?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Open-source vulnerabilities which will not die: Who is to blame? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/","og_locale":"en_US","og_type":"article","og_title":"Open-source vulnerabilities which will not die: Who is to blame? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-17T07:01:01+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Open-source vulnerabilities which will not die: Who is to blame?","datePublished":"2018-08-17T07:01:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/"},"wordCount":945,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/","url":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/","name":"Open-source vulnerabilities which will not die: Who is to blame? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg","datePublished":"2018-08-17T07:01:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/open-source-vulnerabilities-which-will-not-die-who-is-to-blame\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Open-source vulnerabilities which will not die: Who is to blame?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=9815"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9815\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/9816"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=9815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=9815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=9815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}