{"id":84976,"date":"2025-06-10T13:02:00","date_gmt":"2025-06-10T13:02:00","guid":{"rendered":"https:\/\/www.azul.com\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/"},"modified":"2025-07-16T19:13:02","modified_gmt":"2025-07-16T19:13:02","slug":"how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy","status":"publish","type":"post","link":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/","title":{"rendered":"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e"},"content":{"rendered":"\n<p><em><em>\u8bb8\u591a\u6f0f\u6d1e\u68c0\u6d4b\u626b\u63cf\u5de5\u5177\u4f1a\u5c06\u6574\u4e2a\u7ec4\u4ef6\uff08\u4f8b\u5982 JAR \u6587\u4ef6\uff09\u6807\u8bb0\u4e3a\u6613\u53d7\u653b\u51fb\uff0c\u53ea\u8981\u5b83\u5305\u542b\u4e00\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u6587\u4ef6\uff0c\u5373\u4f7f\u8be5\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u4ece\u672a\u88ab\u4f7f\u7528\u8fc7\u3002\u8fd9\u4e9b\u626b\u63cf\u5de5\u5177\u901a\u5e38\u53ea\u80fd\u5728\u7ec4\u4ef6 JAR \u5c42\u7ea7\u8fdb\u884c\u8bc6\u522b\uff0c\u7f3a\u4e4f\u7cbe\u786e\u6027\uff0c\u5bfc\u81f4\u8bef\u62a5\u7387\u8f83\u9ad8\u3002Azul Vulnerability Detection \u53ef\u4ee5\u8bc6\u522b\u5e76\u4f18\u5148\u5904\u7406 Java \u5e94\u7528\u7a0b\u5e8f\u4e2d\u5df2\u77e5\u7684 Java \u5b89\u5168\u6f0f\u6d1e\uff0c\u51c6\u786e\u7387\u9ad8\u8fbe 1,000 \u500d\u3002<\/em><\/em><\/p>\n\n\n\n<p>\u201c\u4e00\u9897\u70c2\u82f9\u679c\u574f\u4e86\u4e00\u7b50\u597d\u82f9\u679c\u3002\u201d\u8bb8\u591a\u6f0f\u6d1e\u68c0\u6d4b\u626b\u63cf\u5de5\u5177\u4f3c\u4e4e\u4ecd\u7136\u9075\u5faa\u8fd9\u53e5 13 \u4e16\u7eaa\u7684\u8c1a\u8bed\u3002\u5f53\u626b\u63cf\u5de5\u5177\u5728 JAR \u6587\u4ef6\u4e2d\u6570\u767e\u4e2a\u4e0d\u5b58\u5728\u6f0f\u6d1e\u7684\u7c7b\u6587\u4ef6\u4e2d\u53d1\u73b0\u4e00\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u6587\u4ef6\u65f6\uff0c\u5b83\u53ef\u80fd\u4f1a\u751f\u6210\u8b66\u62a5\uff0c\u6307\u51fa\u6574\u4e2a JAR \u6587\u4ef6\u90fd\u5b58\u5728\u6f0f\u6d1e\uff0c\u5373\u4f7f\u8be5\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u4ece\u672a\u5728\u751f\u4ea7\u73af\u5883\u4e2d\u4f7f\u7528\u8fc7\u3002\u8fd9\u79cd\u4e00\u5200\u5207\u7684\u505a\u6cd5\u4f1a\u5bfc\u81f4\u626b\u63cf\u5de5\u5177\u4ea7\u751f\u5927\u91cf\u8bef\u62a5\uff0c\u4f7f DevOps \u56e2\u961f\u4e0d\u582a\u91cd\u8d1f\u5e76\u5f71\u54cd\u4ed6\u4eec\u7684\u5de5\u4f5c\u6548\u7387\u3002 &nbsp;<\/p>\n\n\n\n<p>\u5728 Azul \u7684<a href=\"https:\/\/www.azul.com\/zh-hans\/state-of-java-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u300aJava 2025 \u73b0\u72b6\u8c03\u67e5\u4e0e\u62a5\u544a\u300b<\/a>\u4e2d\uff0c33% \u7684\u53c2\u4e0e\u8005\u8868\u793a\uff0c\u4ed6\u4eec\u7684 DevOps \u56e2\u961f\u6709\u4e00\u534a\u4ee5\u4e0a\u7684\u65f6\u95f4\u6d6a\u8d39\u5728\u5904\u7406\u4e0e Java \u76f8\u5173\u7684 CVE\uff08\u5e38\u89c1\u6f0f\u6d1e\u548c\u66b4\u9732\uff09\u7684\u8bef\u62a5\u4e0a\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/DevOps-Time-Wasted-Chart-CN.png?auto=format&crop=faces,entropy&fit=max&q=80&s=f7352059ba6327ed154972b60319c7a5\" alt=\"\" class=\"wp-image-84990\"\/><\/figure>\n\n\n\n<p>\u4f20\u7edf\u7684\u626b\u63cf\u5de5\u5177\u901a\u5e38\u53ea\u80fd\u5728 CI\/CD \u548c\u6d4b\u8bd5\u73af\u5883\u4e2d\u7684 JAR \u5c42\u7ea7\u8fdb\u884c\u8bc6\u522b\uff0c\u6216\u8005\u9488\u5bf9\u751f\u4ea7\u73af\u5883\u5feb\u7167\u8fd0\u884c\u3002\u76f8\u6bd4\u4e4b\u4e0b\uff0c<a href=\"https:\/\/www.azul.com\/zh-hans\/intelligence-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azul Intelligence Cloud<\/a> \u7684\u4e00\u9879\u529f\u80fd <a href=\"https:\/\/www.azul.com\/products\/vulnerability-detection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azul Vulnerability Detection<\/a> \u5728\u751f\u4ea7\u73af\u5883\u4e2d\u7684\u7c7b\u5c42\u7ea7\u8fd0\u884c\uff0c\u53ef\u4ee5\u8bc6\u522b Java \u5e94\u7528\u7a0b\u5e8f\u4e2d\u5df2\u77e5\u7684\u5b89\u5168\u6f0f\u6d1e\u5e76\u786e\u5b9a\u5176\u4f18\u5148\u7ea7\uff0c\u51c6\u786e\u7387\u9ad8\u51fa 100 \u5230 1,000 \u500d\u3002&nbsp;<\/p>\n\n\n\n<p>\u8ba9\u6211\u4eec\u6765\u63a2\u7d22\u4e00\u4e0b Azul Vulnerability Detection \u4e0e\u5176\u4ed6\u5de5\u5177\u7684\u4e0d\u540c\u4e4b\u5904\u3002&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-\u4f7f\u7528\u7c7b\u7ea7\u8fd0\u884c\u65f6\u6570\u636e\u6d88\u9664\u9ad8\u8fbe-99-\u7684\u8bef\u62a5\">\u4f7f\u7528\u7c7b\u7ea7\u8fd0\u884c\u65f6\u6570\u636e\u6d88\u9664\u9ad8\u8fbe 99% \u7684\u8bef\u62a5\u00a0<\/h2>\n\n\n\n<p>\u5305\u542b\u6570\u767e\u4e2a\u7c7b\u7684 JAR \u6587\u4ef6\uff0c\u53ef\u80fd\u53ea\u6709\u4e09\u56db\u4e2a\u7c7b\u5305\u542b\u6613\u53d7\u653b\u51fb\u7684\u4ee3\u7801\u3002\u4f20\u7edf\u626b\u63cf\u5de5\u5177\u4f1a\u5c06\u6574\u4e2a JAR \u6587\u4ef6\u90fd\u8bc6\u522b\u4e3a\u6613\u53d7\u653b\u51fb\u7684\uff0c\u5373\u4f7f\u8fd9\u4e09\u56db\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u4ece\u672a\u5728\u751f\u4ea7\u73af\u5883\u4e2d\u8fd0\u884c\uff0c\u8fd9\u4f1a\u5bfc\u81f4\u6bcf\u6b21\u8fd0\u884c\u5305\u542b\u6613\u53d7\u653b\u51fb JAR \u6587\u4ef6\u7684\u5e94\u7528\u7a0b\u5e8f\u65f6\u90fd\u4f1a\u51fa\u73b0\u8bef\u62a5\u3002\u91cd\u590d\u51fa\u73b0\u8bef\u62a5\u662f\u5426\u597d\u8fc7\u201c\u5403\u5230\u4e00\u9897\u70c2\u82f9\u679c\u201d\uff1f\u6beb\u65e0\u7591\u95ee\u3002\u4f46\u6709\u4e86 Azul Intelligence Cloud\uff0c\u8fd9\u5176\u5b9e\u662f\u4e00\u4e2a\u4f2a\u547d\u9898\u3002\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.azul.com\/wp-content\/uploads\/AVD-CN.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/AVD-CN-1024x575.jpg?auto=format&crop=faces,entropy&fit=max&q=80&s=dd20bfe3b866186af9af30c00bfd6451\" alt=\"\" class=\"wp-image-84984\"\/><\/a><figcaption class=\"wp-element-caption\">\u5373\u4f7f Java \u5b89\u5168\u6f0f\u6d1e\u5e76\u672a\u6784\u6210\u771f\u6b63\u7684\u5a01\u80c1\uff0c\u4f20\u7edf\u626b\u63cf\u5de5\u5177\u4e5f\u4f1a\u4ea7\u751f\u8bef\u62a5\u3002Azul Platform Prime \u4ec5\u5728\u6613\u53d7\u653b\u51fb\u7684\u4ee3\u7801\u5728\u751f\u4ea7\u73af\u5883\u4e2d\u8fd0\u884c\u65f6\u53d1\u51fa\u8b66\u62a5\u3002<\/figcaption><\/figure>\n\n\n\n<p>Azul Vulnerability Detection \u4ec5\u5728\u81f3\u5c11\u4e00\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u5728\u751f\u4ea7\u73af\u5883\u4e2d\u8fd0\u884c\u65f6\u624d\u4f1a\u8bc6\u522b\u6f0f\u6d1e\u3002\u5728\u6700\u8fd1\u5bf9\u51e0\u5bb6\u5927\u578b\u4f01\u4e1a\u7684\u7814\u7a76\u4e2d\uff0cVulnerability Detection \u4e3a\u4ed6\u4eec\u8282\u7701\u4e86 57% \u7684\u4fee\u590d\u65f6\u95f4\u548c\u7cbe\u529b\u3002\u5f53\u60a8\u4e3a\u5de5\u7a0b\u5e08\u8282\u7701\u5982\u6b64\u591a\u7684\u65f6\u95f4\u65f6\uff0c\u4ed6\u4eec\u53ef\u4ee5\u66f4\u8f7b\u677e\u5730\u9632\u6b62\u90a3\u9897\u201c\u70c2\u82f9\u679c\u201d\u8fdb\u5165\u5ba2\u6237\u7684\u201c\u9910\u684c\u201d\u3002\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-\u5229\u7528-ai-\u52a0\u901f\u7684\u5b9e\u65f6\u4e0e\u5386\u53f2\u6570\u636e\u5206\u6790\">\u5229\u7528 AI \u52a0\u901f\u7684\u5b9e\u65f6\u4e0e\u5386\u53f2\u6570\u636e\u5206\u6790\u00a0<\/h2>\n\n\n\n<p>Azul Intelligence Cloud \u4fdd\u7559\u4e86\u7ec4\u4ef6\u548c\u4ee3\u7801\u7684\u4f7f\u7528\u5386\u53f2\u8bb0\u5f55\u3002\u60a8\u7684 DevOps \u56e2\u961f\u53ef\u4ee5\u4f7f\u7528\u8fd9\u4e9b\u4fe1\u606f\u6765\u786e\u5b9a\u6613\u53d7\u653b\u51fb\u7684\u4ee3\u7801\u5728\u88ab\u8bc6\u522b\u4e3a\u6613\u53d7\u653b\u51fb\u4e4b\u524d\u662f\u5426\u5df2\u88ab\u5229\u7528\u3002Azul \u6301\u7eed\u68c0\u6d4b\u5df2\u77e5\u6f0f\u6d1e\uff0c\u5e76\u7cbe\u786e\u5730\u5bf9\u751f\u4ea7\u73af\u5883\u4e2d\u7684\u4ee3\u7801\u8fdb\u884c\u5206\u7c7b\uff0c\u4ee5\u4fbf\u60a8\u7684 DevOps \u56e2\u961f\u80fd\u591f\u96c6\u4e2d\u5176\u7a00\u7f3a\u7684\u8d44\u6e90\u3002Azul \u4f7f\u7528 AI \u4ece NVD\uff08\u7f8e\u56fd\u56fd\u5bb6\u6f0f\u6d1e\u6570\u636e\u5e93\uff09\u4e2d\u5feb\u901f\u8bc6\u522b\u7279\u5b9a\u4e8e Java \u7684 CVE\uff0c\u5e76\u4f7f\u7528\u65b0\u53d1\u5e03\u7684\u6f0f\u6d1e\u66f4\u65b0 Azul Vulnerability Detection \u77e5\u8bc6\u5e93\u3002&nbsp;<\/p>\n\n\n\n<p>Intelligence Cloud \u63d0\u4f9b\u6301\u7eed\u68c0\u6d4b\uff0c\u4f7f DevOps \u56e2\u961f\u80fd\u591f\u5728\u51fa\u73b0\u50cf Log4Shell \u8fd9\u6837\u7684\u4e94\u7ea7\u8b66\u62a5\u6f0f\u6d1e\u65f6\uff0c\u9ad8\u6548\u5730\u5206\u7c7b\u5904\u7406\u751f\u4ea7\u73af\u5883\u4e2d\u7684\u5173\u952e\u6f0f\u6d1e\u3002Azul \u6700\u5927\u9650\u5ea6\u5730\u51cf\u5c11\u5e72\u6270\uff0c\u8282\u7701 DevOps \u56e2\u961f\u7684\u65f6\u95f4\uff0c\u4f7f\u4ed6\u4eec\u80fd\u591f\u4e13\u6ce8\u4e8e\u5176\u4ed6\u751f\u4ea7\u6027\u4efb\u52a1\u3002\u66f4\u4e13\u6ce8\u7684 DevOps \u56e2\u961f\uff0c\u66f4\u5c11\u7684\u201c\u70c2\u82f9\u679c\u201d\uff0c\u66f4\u51c6\u786e\u7684\u6f0f\u6d1e\u68c0\u6d4b\u3002&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-\u7ed3\u8bed\">\u7ed3\u8bed\u00a0<\/h2>\n\n\n\n<p>\u8bef\u62a5\u4e0d\u4ec5\u4f1a\u964d\u4f4e DevOps \u7684\u751f\u4ea7\u529b\uff0c\u8fd8\u4f1a\u5bfc\u81f4\u7f51\u7edc\u5b89\u5168\u5026\u6020\u3002\u5f53\u56e2\u961f\u957f\u671f\u9971\u53d7\u5b89\u5168\u75b2\u52b3\u56f0\u6270\u65f6\uff0c\u4ed6\u4eec\u4e0d\u53ef\u907f\u514d\u5730\u4f1a\u5f00\u59cb\u5ffd\u7565\u8b66\u62a5\uff0c\u8fd9\u53ef\u80fd\u5bfc\u81f4\u5c06\u5b58\u5728\u6f0f\u6d1e\u7684\u5e94\u7528\u7a0b\u5e8f\u4ea4\u4ed8\u7ed9\u5ba2\u6237\uff0c\u6216\u5c06\u53ef\u5229\u7528\u7684\u4ee3\u7801\u90e8\u7f72\u5230\u751f\u4ea7\u73af\u5883\u4e2d\u3002&nbsp;<\/p>\n\n\n\n<p>Azul Vulnerability Detection \u7684\u4f18\u52bf\u662f\u5b9e\u5b9e\u5728\u5728\u7684\uff0c\u4e0d\u4ec5\u80fd\u591f\u6700\u5927\u9650\u5ea6\u5730\u51cf\u5c11\u7f51\u7edc\u5b89\u5168\u5026\u6020\uff0c\u8fd8\u80fd\u6700\u5927\u9650\u5ea6\u5730\u63d0\u9ad8 DevOps \u751f\u4ea7\u529b\u3002\u5728 2025 \u5e74 Censuswide \u8c03\u67e5\u4e2d\uff0c\u5e94\u7528\u7a0b\u5e8f\u5f00\u53d1\u4eba\u5458\u8868\u793a\uff0c\u4ed6\u4eec\u5c06 41% \u7684\u65f6\u95f4\u7528\u4e8e\u7ef4\u62a4\u548c\u6dd8\u6c70\u4ee3\u7801\u3001\u626b\u63cf\u6216\u4fee\u590d\u6f0f\u6d1e\u4ee5\u53ca\u53c2\u52a0\u4f1a\u8bae\u3002\u6240\u6709\u8fd9\u4e9b\u65e0\u5173\u7d27\u8981\u7684\u5de5\u4f5c\uff0c\u53ea\u7559\u4e0b 27% \u7684\u65f6\u95f4\u7528\u4e8e\u7f16\u5199\u6216\u6539\u8fdb\u4ee3\u7801\u3002&nbsp;<\/p>\n\n\n\n<p>Azul Code Inventory \u6700\u8fd1\u5bf9\u591a\u5bb6\u5927\u578b\u4f01\u4e1a\u8fdb\u884c\u4e86\u4e00\u9879\u7814\u7a76\uff0c\u7ed3\u679c\u663e\u793a\u5f00\u53d1\u4eba\u5458\u5c06\u8d85\u8fc7 50% \u7684\u65f6\u95f4\u7528\u4e8e\u7ef4\u62a4\u73b0\u6709\u4ee3\u7801\u3002\u901a\u8fc7\u964d\u4f4e\u672a\u4f7f\u7528\u7ec4\u4ef6\u4e2d CVE \u7684\u4f18\u5148\u7ea7\uff0c\u5458\u5de5\u5c06\u7d27\u6025\u4fee\u590d\u5de5\u4f5c\u51cf\u5c11\u4e86\u7ea6 57%\uff0c\u8282\u7701\u4e86\u76f8\u5f53\u4e8e\u516d\u540d\u5168\u804c\u5458\u5de5\u7684\u5de5\u7a0b\u65f6\u95f4\u3002\u7acb\u5373\u8054\u7cfb\u6211\u4eec\uff0c\u4e86\u89e3\u60a8\u7684\u7ec4\u7ec7\u5982\u4f55\u5f00\u59cb\u4f7f\u7528 Azul Vulnerability Detection \u8282\u7701\u6210\u672c\u3002<\/p>\n\n\n\n\n\n<section    class=\"c-cta-band c-cta-band--color-dark c-cta-band--mt-default c-cta-band--mb-default c-cta-band--pt-default c-cta-band--pb-default c-cta-band--color-1 o-component o-component--color-dark o-component--mt-default o-component--mb-default o-component--pt-default o-component--pb-default\"\n\n            id=\"block_a6b429f44fc8e50ab52c9021d3740828\"\n    \n    >\n    \n    <div class=\"o-component__wrap\">\n                    <div class=\"o-container\">\n        \n<div class=\"c-cta-band__wrap c-cta-band__wrap--shadow c-cta-band__wrap--bg-white\" id=\"c-cta-band__wrap--block_a6b429f44fc8e50ab52c9021d3740828\">\n            \n    <span class=\"o-picture o-picture--background o-picture--cover o-picture--no-radius\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=362&#038;s=ae1f3f0bfa8a612b5bd5bb7708e54000 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=724&#038;s=c5a339e2c0c8e0f50441736fadca4764 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=704&#038;s=dcc7fb83f642528ac178806b7fcb6516 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=1408&#038;s=57e6e9182da2743b84860eb7a8840f6c 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=960&#038;s=7ac6190ac3a7aafb8a77a98636893ec8 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=1920&#038;s=76cd6013b0a569c497fb32cb10d966de 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=1120&#038;s=fe6115312ca5786346e76374278ecd4e 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=2240&#038;s=18e685aeb4524416802a51ba792c7458 2x\"\n            >\n            \n    <img alt=\"Is Your Java Runtime as Secure as it Could Be?\" class=\"o-picture__image\" height=\"289\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=1120&#038;s=fe6115312ca5786346e76374278ecd4e 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/v7.3-Azul-Banner-9720x25-1.png?auto=format&#038;crop=faces,entropy&#038;fit=max&#038;q=80&#038;w=2240&#038;s=18e685aeb4524416802a51ba792c7458 2x\" width=\"1120\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"c-cta-band__content\">\n        <div class=\"c-cta-band__text\" id=\"c-cta-band__text--block_a6b429f44fc8e50ab52c9021d3740828\">\n                            \n<h2  class=\"c-cta-band__headline o-headline o-headline--h2 s-medium\"\n    >\n  <b>Vulnerability Detection<\/b><\/h2>\n            \n                            \n<div  class=\"c-cta-band__description o-description o-description--body s-wysiwyg s-wysiwyg--description\"\n\n  >\n  <div id=\"c-cta-band__text--block_f346dd06-3b21-4baa-b78d-23cc5d1e84a0\" class=\"c-cta-band__text\">\n<div class=\"c-cta-band__description\">\n<p>Azul leverages the JVM to detect known vulnerabilities in Java applications in production.<\/p>\n<\/div>\n<\/div>\n<\/div>\n                    <\/div>\n\n                    <div class=\"c-cta-band__cta\">\n                \n<a  class=\"c-cta-band__cta-btn o-button o-button--red-500 o-button--solid\"\n\n  data-cta-band-modal-id=\"cta-band-form-modal-block_a6b429f44fc8e50ab52c9021d3740828\" href='https:\/\/www.azul.com\/products\/vulnerability-detection\/' target=''\n  >\n  \n  \n  <span class=\"o-button__label\">Learn More<\/span>\n\n  \n  <\/a>\n            <\/div>\n        \n            <\/div>\n<\/div>\n\n\n          <\/div>\n      <\/div>\n<\/section>\n\n<style>\n            #block_a6b429f44fc8e50ab52c9021d3740828,\n        #block_a6b429f44fc8e50ab52c9021d3740828 input::placeholder {\n            color: dark;\n        }\n    <\/style>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8bb8\u591a\u6f0f\u6d1e\u68c0\u6d4b\u626b\u63cf\u5de5\u5177\u4f1a\u5c06\u6574\u4e2a\u7ec4\u4ef6\uff08\u4f8b\u5982 JAR \u6587\u4ef6\uff09\u6807\u8bb0\u4e3a\u6613\u53d7\u653b\u51fb\uff0c\u53ea\u8981\u5b83\u5305\u542b\u4e00\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u6587\u4ef6\uff0c\u5373\u4f7f\u8be5\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u4ece\u672a\u88ab\u4f7f\u7528\u8fc7\u3002\u8fd9\u4e9b\u626b\u63cf\u5de5\u5177\u901a\u5e38\u53ea\u80fd\u5728\u7ec4\u4ef6 JAR \u5c42\u7ea7\u8fdb\u884c\u8bc6\u522b\uff0c\u7f3a\u4e4f\u7cbe\u786e\u6027\uff0c\u5bfc\u81f4\u8bef\u62a5\u7387\u8f83\u9ad8\u3002Azul Vulnerability Detection \u53ef\u4ee5\u8bc6\u522b\u5e76\u4f18\u5148\u5904\u7406 Java \u5e94\u7528\u7a0b\u5e8f\u4e2d\u5df2\u77e5\u7684 Java \u5b89\u5168\u6f0f\u6d1e\uff0c\u51c6\u786e\u7387\u9ad8\u8fbe 1,000 \u500d\u3002<\/p>\n","protected":false},"author":109,"featured_media":84984,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[448],"tags":[445,453],"resource_categories":[488,584],"industry":[],"product":[285],"role":[609,610,611,612,614,616,617,639,640],"resource_topic":[283],"class_list":["post-84976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-zh-hans","tag-openjdk-zh-hans","tag-security-zh-hans","resource_categories-java-security","resource_categories-openjdk-security-vulnerabilities","product-intelligence-cloud","role-developer-zh-hans","role-devops-zh-hans","role-head-of-engineering-zh-hans","role-vp-engineering-zh-hans","role-ciso-zh-hans","role-it-decision-maker-zh-hans","role-risk-manager-zh-hans","role-cto-zh-hans","role-product-manager-zh-hans","resource_topic-security-risk"],"acf":{"article_smart_summary":null,"article_sidebar_nav_items":null,"article_cta":null,"block_background_image":null,"block_background_image_sizing":null,"block_background_overflow":null,"block_background_color":null,"inline_link":null,"text_color":null,"block_margin_top":null,"block_padding_top":null,"block_padding_bottom":null,"block_margin_bottom":null,"link":null,"appearance":null,"color":null,"show_arrow":null,"style":null,"image":null,"background_color":null,"background_image":null,"overline":null,"overline_options":null,"headline":null,"headline_options":null,"description":null,"description_options":null,"cta":null,"text_align":null,"chart_type":null,"chart_options":null,"chart_labels":null,"chart_datasets":null,"countdown_date_time":null,"countdown_clock_color":null,"countdown_label_color":null,"size":null,"use_gradient_text":null,"start_color":null,"end_color":null,"name":null,"iconify":null,"logos":null,"form_headline":null,"form_number":null,"form_redirect_enabled":null,"redirect":null,"form_translation_disable":null,"zi_id":null,"zi_fields":null,"zi_lookup_field":null,"cookie_name":null,"cookie_redirect":null,"drift_playbook_campaign_id":null,"input":null,"button":null,"logo":null,"ctas":null,"alignment":null,"cta_alignment":null,"grid_layout":null,"show_featured_images":null,"show_excerpts":null,"featured_image_size":null,"cards":null,"thank_you_page_enable":null,"banner_image":null,"subheadline":null,"download_button":null,"featured_video":null,"additional_videos":null,"smart_content":null,"animation":null,"video_type":null,"vimeo_video_id":null,"youtube_video_id":null,"upload":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e - Azul | Better Java Performance, Superior Java Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e\" \/>\n<meta property=\"og:description\" content=\"\u8bb8\u591a\u6f0f\u6d1e\u68c0\u6d4b\u626b\u63cf\u5de5\u5177\u4f1a\u5c06\u6574\u4e2a\u7ec4\u4ef6\uff08\u4f8b\u5982 JAR \u6587\u4ef6\uff09\u6807\u8bb0\u4e3a\u6613\u53d7\u653b\u51fb\uff0c\u53ea\u8981\u5b83\u5305\u542b\u4e00\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u6587\u4ef6\uff0c\u5373\u4f7f\u8be5\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u4ece\u672a\u88ab\u4f7f\u7528\u8fc7\u3002\u8fd9\u4e9b\u626b\u63cf\u5de5\u5177\u901a\u5e38\u53ea\u80fd\u5728\u7ec4\u4ef6 JAR \u5c42\u7ea7\u8fdb\u884c\u8bc6\u522b\uff0c\u7f3a\u4e4f\u7cbe\u786e\u6027\uff0c\u5bfc\u81f4\u8bef\u62a5\u7387\u8f83\u9ad8\u3002Azul Vulnerability Detection \u53ef\u4ee5\u8bc6\u522b\u5e76\u4f18\u5148\u5904\u7406 Java \u5e94\u7528\u7a0b\u5e8f\u4e2d\u5df2\u77e5\u7684 Java \u5b89\u5168\u6f0f\u6d1e\uff0c\u51c6\u786e\u7387\u9ad8\u8fbe 1,000 \u500d\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/\" \/>\n<meta property=\"og:site_name\" content=\"Azul | Better Java Performance, Superior Java Support\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AzulSystemsInc\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-10T13:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T19:13:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.azul.com\/wp-content\/uploads\/AVD-CN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1274\" \/>\n\t<meta property=\"og:image:height\" content=\"715\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azulsystems\" \/>\n<meta name=\"twitter:site\" content=\"@azulsystems\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin West\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/\"},\"author\":{\"name\":\"Kevin West\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/#\\\/schema\\\/person\\\/0563b3fcd854ff6a6626f8f2db2384a4\"},\"headline\":\"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e\",\"datePublished\":\"2025-06-10T13:02:00+00:00\",\"dateModified\":\"2025-07-16T19:13:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/\"},\"wordCount\":89,\"publisher\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.azul.com\\\/wp-content\\\/uploads\\\/AVD-CN.jpg\",\"keywords\":[\"OpenJDK\",\"security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"zh-CN\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/\",\"url\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/\",\"name\":\"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e - Azul | Better Java Performance, Superior Java Support\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.azul.com\\\/wp-content\\\/uploads\\\/AVD-CN.jpg\",\"datePublished\":\"2025-06-10T13:02:00+00:00\",\"dateModified\":\"2025-07-16T19:13:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/#breadcrumb\"},\"inLanguage\":\"zh-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.azul.com\\\/wp-content\\\/uploads\\\/AVD-CN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.azul.com\\\/wp-content\\\/uploads\\\/AVD-CN.jpg\",\"width\":1274,\"height\":715},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/#website\",\"url\":\"https:\\\/\\\/www.azul.com\\\/\",\"name\":\"Azul | Better Java Performance, Superior Java Support\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.azul.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-CN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/#organization\",\"name\":\"Azul\",\"alternateName\":\"Azul Systems\",\"url\":\"https:\\\/\\\/www.azul.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.azul.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.azul.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo.svg\",\"width\":112,\"height\":48,\"caption\":\"Azul\"},\"image\":{\"@id\":\"https:\\\/\\\/www.azul.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AzulSystemsInc\",\"https:\\\/\\\/x.com\\\/azulsystems\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCSoJZa--HhjV9iXtbHUmm8A\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/azul-systems\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.azul.com\\\/#\\\/schema\\\/person\\\/0563b3fcd854ff6a6626f8f2db2384a4\",\"name\":\"Kevin West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3540ecb19a8eee1ee2527b0e7e1caf8723673438a58641d6fc9dae0adb796e0a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3540ecb19a8eee1ee2527b0e7e1caf8723673438a58641d6fc9dae0adb796e0a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3540ecb19a8eee1ee2527b0e7e1caf8723673438a58641d6fc9dae0adb796e0a?s=96&d=mm&r=g\",\"caption\":\"Kevin West\"},\"url\":\"https:\\\/\\\/www.azul.com\\\/zh-hans\\\/blog\\\/author\\\/kwestazul-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e - Azul | Better Java Performance, Superior Java Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/","og_locale":"zh_CN","og_type":"article","og_title":"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e","og_description":"\u8bb8\u591a\u6f0f\u6d1e\u68c0\u6d4b\u626b\u63cf\u5de5\u5177\u4f1a\u5c06\u6574\u4e2a\u7ec4\u4ef6\uff08\u4f8b\u5982 JAR \u6587\u4ef6\uff09\u6807\u8bb0\u4e3a\u6613\u53d7\u653b\u51fb\uff0c\u53ea\u8981\u5b83\u5305\u542b\u4e00\u4e2a\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u6587\u4ef6\uff0c\u5373\u4f7f\u8be5\u6613\u53d7\u653b\u51fb\u7684\u7c7b\u4ece\u672a\u88ab\u4f7f\u7528\u8fc7\u3002\u8fd9\u4e9b\u626b\u63cf\u5de5\u5177\u901a\u5e38\u53ea\u80fd\u5728\u7ec4\u4ef6 JAR \u5c42\u7ea7\u8fdb\u884c\u8bc6\u522b\uff0c\u7f3a\u4e4f\u7cbe\u786e\u6027\uff0c\u5bfc\u81f4\u8bef\u62a5\u7387\u8f83\u9ad8\u3002Azul Vulnerability Detection \u53ef\u4ee5\u8bc6\u522b\u5e76\u4f18\u5148\u5904\u7406 Java \u5e94\u7528\u7a0b\u5e8f\u4e2d\u5df2\u77e5\u7684 Java \u5b89\u5168\u6f0f\u6d1e\uff0c\u51c6\u786e\u7387\u9ad8\u8fbe 1,000 \u500d\u3002","og_url":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/","og_site_name":"Azul | Better Java Performance, Superior Java Support","article_publisher":"https:\/\/www.facebook.com\/AzulSystemsInc","article_published_time":"2025-06-10T13:02:00+00:00","article_modified_time":"2025-07-16T19:13:02+00:00","og_image":[{"width":1274,"height":715,"url":"https:\/\/www.azul.com\/wp-content\/uploads\/AVD-CN.jpg","type":"image\/jpeg"}],"author":"Kevin West","twitter_card":"summary_large_image","twitter_creator":"@azulsystems","twitter_site":"@azulsystems","twitter_misc":{"\u4f5c\u8005":"Kevin West"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/#article","isPartOf":{"@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/"},"author":{"name":"Kevin West","@id":"https:\/\/www.azul.com\/#\/schema\/person\/0563b3fcd854ff6a6626f8f2db2384a4"},"headline":"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e","datePublished":"2025-06-10T13:02:00+00:00","dateModified":"2025-07-16T19:13:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/"},"wordCount":89,"publisher":{"@id":"https:\/\/www.azul.com\/#organization"},"image":{"@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.azul.com\/wp-content\/uploads\/AVD-CN.jpg","keywords":["OpenJDK","security"],"articleSection":["Security"],"inLanguage":"zh-CN"},{"@type":"WebPage","@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/","url":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/","name":"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e - Azul | Better Java Performance, Superior Java Support","isPartOf":{"@id":"https:\/\/www.azul.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/#primaryimage"},"image":{"@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.azul.com\/wp-content\/uploads\/AVD-CN.jpg","datePublished":"2025-06-10T13:02:00+00:00","dateModified":"2025-07-16T19:13:02+00:00","breadcrumb":{"@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/#breadcrumb"},"inLanguage":"zh-CN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/"]}]},{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/#primaryimage","url":"https:\/\/www.azul.com\/wp-content\/uploads\/AVD-CN.jpg","contentUrl":"https:\/\/www.azul.com\/wp-content\/uploads\/AVD-CN.jpg","width":1274,"height":715},{"@type":"BreadcrumbList","@id":"https:\/\/www.azul.com\/zh-hans\/blog\/how-azul-identifies-java-security-vulnerabilities-with-1000-times-greater-accuracy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.azul.com\/zh-hans\/"},{"@type":"ListItem","position":2,"name":"Azul \u5982\u4f55\u4ee5\u9ad8\u8fbe 1,000 \u500d\u7684\u51c6\u786e\u7387\u8bc6\u522b Java \u5b89\u5168\u6f0f\u6d1e"}]},{"@type":"WebSite","@id":"https:\/\/www.azul.com\/#website","url":"https:\/\/www.azul.com\/","name":"Azul | Better Java Performance, Superior Java Support","description":"","publisher":{"@id":"https:\/\/www.azul.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.azul.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-CN"},{"@type":"Organization","@id":"https:\/\/www.azul.com\/#organization","name":"Azul","alternateName":"Azul Systems","url":"https:\/\/www.azul.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","contentUrl":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","width":112,"height":48,"caption":"Azul"},"image":{"@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AzulSystemsInc","https:\/\/x.com\/azulsystems","https:\/\/www.youtube.com\/channel\/UCSoJZa--HhjV9iXtbHUmm8A","https:\/\/www.linkedin.com\/company\/azul-systems"]},{"@type":"Person","@id":"https:\/\/www.azul.com\/#\/schema\/person\/0563b3fcd854ff6a6626f8f2db2384a4","name":"Kevin West","image":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/secure.gravatar.com\/avatar\/3540ecb19a8eee1ee2527b0e7e1caf8723673438a58641d6fc9dae0adb796e0a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3540ecb19a8eee1ee2527b0e7e1caf8723673438a58641d6fc9dae0adb796e0a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3540ecb19a8eee1ee2527b0e7e1caf8723673438a58641d6fc9dae0adb796e0a?s=96&d=mm&r=g","caption":"Kevin West"},"url":"https:\/\/www.azul.com\/zh-hans\/blog\/author\/kwestazul-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/posts\/84976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/users\/109"}],"replies":[{"embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=84976"}],"version-history":[{"count":0,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/posts\/84976\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/media\/84984"}],"wp:attachment":[{"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=84976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/categories?post=84976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/tags?post=84976"},{"taxonomy":"resource_categories","embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/resource_categories?post=84976"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/industry?post=84976"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/product?post=84976"},{"taxonomy":"role","embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/role?post=84976"},{"taxonomy":"resource_topic","embeddable":true,"href":"https:\/\/www.azul.com\/zh-hans\/wp-json\/wp\/v2\/resource_topic?post=84976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}