CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Apple » Mac Os X : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
1999 1 1
2001 5 1 1 1
2002 20 7 8 3 2
2003 25 3 5 6 3
2004 54 4 11 8 1 2 2 5
2005 96 13 28 20 1 1 1 5 3 9
2006 106 34 48 34 5 1 1 6 4 5
2007 106 33 44 27 11 3 2 1 10 9 17 3
2008 94 31 42 20 8 3 2 9 13 6
2009 81 44 43 30 13 3 1 4 5 7 6
2010 97 56 52 42 15 3 3 9 5 3 1
2011 74 35 36 29 9 1 8 8 2
2012 37 21 20 13 4 1 6 2
2013 71 29 14 12 4 15 15
2014 149 54 73 43 20 25 23 6 1
2015 422 211 178 173 140 2 1 50 57 59 1 2
2016 166 120 89 98 80 1 4 27 19
Total 1604 696 692 558 310 18 11 2 148 178 146 2 12
% Of All 43.4 43.1 34.8 19.3 0.0 1.1 0.7 0.1 9.2 11.1 9.1 0.1 0.0

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
1
5
20
25
54
96
106
106
94
81
97
74
37
71
149
422
166
  1999 1
2001 5
2002 20
2003 25
2004 54
2005 96
2006 106
2007 106
2008 94
2009 81
2010 97
2011 74
2012 37
2013 71
2014 149
2015 422
2016 166
Vulnerabilities By Type
696
692
178
146
558
11
148
310
18
2
2
  Denial of Service 696
Execute Code 692
Gain Information 178
Gain Privilege 146
Overflow 558
Directory Traversal 11
Bypass Something 148
Memory Corruption 310
XSS 18
Http Response Splitting 2
CSRF 2

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all versions of Apple Mac Os X. Vulnerability statistics provide a quick overview for security vulnerabilities of this software. You can view versions of this product or security vulnerabilities related to Apple Mac Os X.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.