IBM : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2014 | 9 | 0 | 12 | 122 | 11 | 0 | 28 | 6 | 0 | 7 | 35 |
2015 | 30 | 4 | 4 | 71 | 8 | 0 | 11 | 5 | 0 | 3 | 10 |
2016 | 20 | 0 | 8 | 97 | 10 | 0 | 17 | 10 | 2 | 8 | 17 |
2017 | 13 | 3 | 19 | 213 | 7 | 2 | 27 | 24 | 1 | 17 | 29 |
2018 | 10 | 2 | 8 | 185 | 11 | 6 | 17 | 26 | 2 | 8 | 18 |
2019 | 16 | 4 | 8 | 110 | 12 | 3 | 14 | 15 | 2 | 8 | 5 |
2020 | 10 | 31 | 13 | 92 | 10 | 3 | 14 | 11 | 6 | 7 | 20 |
2021 | 18 | 15 | 6 | 142 | 8 | 3 | 15 | 15 | 18 | 1 | 15 |
2022 | 4 | 3 | 10 | 67 | 5 | 0 | 20 | 8 | 8 | 1 | 16 |
2023 | 13 | 4 | 8 | 56 | 11 | 0 | 5 | 7 | 4 | 1 | 57 |
2024 | 3 | 1 | 1 | 20 | 3 | 2 | 4 | 3 | 1 | 1 | 12 |
Total | 146 | 67 | 97 | 1175 | 96 | 19 | 172 | 130 | 44 | 62 | 234 |
Vulnerabilities by impact types
Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
---|---|---|---|---|---|
2014 | 21 | 12 | 12 | 42 | 55 |
2015 | 21 | 16 | 16 | 44 | 63 |
2016 | 15 | 41 | 41 | 38 | 82 |
2017 | 20 | 40 | 38 | 32 | 148 |
2018 | 18 | 21 | 24 | 29 | 129 |
2019 | 20 | 3 | 5 | 19 | 45 |
2020 | 62 | 12 | 14 | 53 | 16 |
2021 | 18 | 6 | 6 | 32 | 21 |
2022 | 3 | 18 | 16 | 47 | 25 |
2023 | 22 | 8 | 18 | 63 | 48 |
2024 | 6 | 6 | 4 | 21 | 11 |
Total | 226 | 183 | 194 | 420 | 643 |
This page lists vulnerability statistics for all products of IBM. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of IBM. You can view products or security vulnerabilities of IBM products.