Log in to view product risk score details

Threat overview for Ubuntu Linux

Learn more about security ratings, threat and attack surface intelligence by SecurityScorecard.
Top countries where our scanners detected Ubuntu Linux
Top open port discovered on systems running Ubuntu Linux 4190
IPs running Ubuntu Linux 65,480
Threat actors targeting Ubuntu Linux? Yes
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.

Vulnerabilities by types/categories

Year Overflow Memory Corruption Sql Injection XSS Directory Traversal File Inclusion CSRF XXE SSRF Open Redirect Input Validation
2015 48 55 0 3 4 0 0 3 0 0 0
2016 43 61 0 1 3 0 2 3 1 0 0
2017 42 52 0 1 5 0 0 1 0 0 13
2018 188 253 2 11 7 3 3 0 0 3 43
2019 95 156 0 6 11 0 1 0 0 3 21
2020 81 118 1 7 5 2 1 3 0 1 13
2021 1 5 0 0 0 0 0 0 0 0 1
2022 2 8 0 0 0 0 0 0 0 0 3
2023 2 6 0 0 0 0 0 0 0 0 0
2024 0 3 0 0 0 0 0 0 0 0 0
2025 0 0 0 0 0 0 0 0 0 0 0
Total 502 717 3 29 35 5 7 10 1 7 94

Vulnerabilities by impact types

Year Code Execution Bypass Privilege Escalation Denial of Service Information Leak
2015 53 0 0 180 0
2016 45 0 0 188 0
2017 17 1 1 122 6
2018 61 8 16 322 55
2019 24 18 19 202 26
2020 19 6 10 143 15
2021 0 0 0 1 1
2022 4 3 9 6 0
2023 1 0 7 4 0
2024 1 0 0 0 0
2025 0 0 0 1 0
Total 225 36 62 1169 103

This page lists vulnerability statistics for all versions of Canonical » Ubuntu Linux. Vulnerability statistics provide a quick overview for security vulnerabilities of Ubuntu Linux. You can view versions of this product or security vulnerabilities of Canonical Ubuntu Linux .

Please note that we generate vendor, product and version statistics based on CVE and CPE data and there may be inconsistencies in data sometimes or statistics may not be reliable due to certain circumstances.

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!