Linux : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2014 | 20 | 31 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 22 |
2015 | 13 | 17 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 5 |
2016 | 36 | 76 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 17 |
2017 | 64 | 86 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 20 |
2018 | 32 | 70 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 11 |
2019 | 30 | 124 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 4 |
2020 | 10 | 41 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 2 |
2021 | 21 | 60 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 11 |
2022 | 41 | 151 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 |
2023 | 18 | 172 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 |
2024 | 13 | 165 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 298 | 993 | 5 | 96 |
Vulnerabilities by impact types
Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
---|---|---|---|---|---|
2014 | 8 | 0 | 0 | 88 | 11 |
2015 | 4 | 0 | 0 | 53 | 5 |
2016 | 4 | 11 | 11 | 153 | 25 |
2017 | 169 | 28 | 163 | 148 | 82 |
2018 | 1 | 0 | 7 | 89 | 16 |
2019 | 7 | 1 | 8 | 114 | 7 |
2020 | 3 | 0 | 4 | 26 | 4 |
2021 | 5 | 3 | 9 | 23 | 5 |
2022 | 8 | 10 | 15 | 53 | 19 |
2023 | 13 | 3 | 41 | 48 | 23 |
2024 | 1 | 0 | 2 | 22 | 1 |
Total | 223 | 56 | 260 | 817 | 198 |
This page lists vulnerability statistics for all products of Linux. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Linux. You can view products or security vulnerabilities of Linux products.