CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Redhat » Enterprise Linux Workstation : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
2004 3 3 1
2005 2 2 1
2006 2 1
2007 7 4 1 2 1 2
2008 5 1 1 1 1
2009 6 3 1 1 2 1
2010 5 4 1 1 1 1
2011 19 14 5 1 5 2
2012 96 43 54 22 28 9 6 5 2
2013 85 37 38 22 24 1 2 4 1
2014 78 36 20 11 7 2 8 9 2 2
2015 111 42 14 28 6 9 13 7
2016 173 60 38 35 9 17 11 1
2017 251 50 41 34 14 2 1 14 16 2
2018 573 103 59 113 32 1 7 4 38 40 1 1
2019 285 29 46 26 17 3 5 19 21
2020 53 4 10 6 4 4 4 3
2021 9 4 2 1 1 2
2022 15 1 4 1 1 2
2023 2 1 1 1
Total 1780 433 334 311 147 1 32 9 2 120 135 19 1 2
% Of All 24.3 18.8 17.5 8.3 0.1 1.8 0.5 0.1 6.7 7.6 1.1 0.1 0.0

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
3
2
2
7
5
6
5
19
96
85
78
111
173
251
573
285
53
9
15
2
  2004 3
2005 2
2006 2
2007 7
2008 5
2009 6
2010 5
2011 19
2012 96
2013 85
2014 78
2015 111
2016 173
2017 251
2018 573
2019 285
2020 53
2021 9
2022 15
2023 2
Vulnerabilities By Type
334
311
433
32
135
2
147
120
19
1
9
1
  Execute Code 334
Overflow 311
Denial of Service 433
XSS 32
Gain Information 135
Http Response Splitting 2
Memory Corruption 147
Bypass Something 120
Gain Privilege 19
Sql Injection 1
Directory Traversal 9
CSRF 1

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all versions of Redhat Enterprise Linux Workstation. Vulnerability statistics provide a quick overview for security vulnerabilities of this software. You can view versions of this product or security vulnerabilities related to Redhat Enterprise Linux Workstation.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.