CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Apple » Iphone Os : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
2007 1 1 1
2008 2 2 2 1
2009 11 2 3 2 2 2 3 1
2010 20 11 9 5 3 4 2 1 1
2011 83 52 7 6 6 5 7 13 1
2012 155 114 70 67 60 8 15 9 1
2013 95 57 50 42 46 4 17 9 1
2014 120 50 51 35 33 1 20 24 4
2015 386 232 211 184 191 5 44 63 13 1 1
2016 168 113 79 81 81 3 8 42 11
2017 388 241 222 210 194 14 39 63 5
2018 125 63 63 55 50 1 19 19 2
2019 356 9 101 90 167 2 14 25 5
2020 315 17 143 51 60 8 2 6 12 5
2021 365 15 176 34 42 6 3 12 9 9
2022 43 2 17 4 7 3 3 4
Total 2633 980 1205 868 942 2 63 11 196 296 62 2 2
% Of All 37.2 45.8 33.0 35.8 0.1 2.4 0.4 0.0 7.4 11.2 2.4 0.1 0.0

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
1
2
11
20
83
155
95
120
386
168
388
125
356
315
365
43
  2007 1
2008 2
2009 11
2010 20
2011 83
2012 155
2013 95
2014 120
2015 386
2016 168
2017 388
2018 125
2019 356
2020 315
2021 365
2022 43
Vulnerabilities By Type
1205
868
980
942
196
296
2
62
63
11
2
  Execute Code 1205
Overflow 868
Denial of Service 980
Memory Corruption 942
Bypass Something 196
Gain Information 296
CSRF 2
Gain Privilege 62
XSS 63
Directory Traversal 11
Sql Injection 2

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all versions of Apple Iphone Os. Vulnerability statistics provide a quick overview for security vulnerabilities of this software. You can view versions of this product or security vulnerabilities related to Apple Iphone Os.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.