Redhat » Enterprise Linux : Vulnerability Statistics
Vulnerabilities By Weakness Types
| Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 2013 | 16 | 8 | 2 | 1 | 8 | ||||||
| 2014 | 5 | 5 | 1 | 2 | 4 | ||||||
| 2015 | 8 | 4 | 1 | 1 | |||||||
| 2016 | 4 | 4 | 5 | ||||||||
| 2017 | 5 | 13 | 1 | 1 | 3 | ||||||
| 2018 | 31 | 57 | 1 | 1 | 6 | 12 | |||||
| 2019 | 38 | 50 | 2 | 1 | 11 | 1 | 14 | ||||
| 2020 | 21 | 24 | 1 | 5 | 2 | 1 | 4 | ||||
| 2021 | 33 | 43 | 1 | 1 | 2 | 11 | |||||
| 2022 | 23 | 63 | 2 | 3 | 1 | 2 | 2 | ||||
| 2023 | 14 | 37 | 1 | 2 | 5 | ||||||
| Total | 198 | 308 | 8 | 14 | 25 | 1 | 1 | 3 | 2 | 2 | 69 |
Vulnerabilities by impact types
| Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
|---|---|---|---|---|---|
| 2013 | 5 | 34 | 10 | ||
| 2014 | 7 | 24 | 3 | ||
| 2015 | 9 | 15 | |||
| 2016 | 8 | 2 | 2 | 13 | 6 |
| 2017 | 2 | 1 | 8 | 3 | |
| 2018 | 7 | 6 | 12 | 22 | 14 |
| 2019 | 14 | 12 | 11 | 148 | 12 |
| 2020 | 7 | 3 | 7 | 27 | 5 |
| 2021 | 6 | 1 | 2 | 26 | 8 |
| 2022 | 14 | 7 | 12 | 42 | 12 |
| 2023 | 6 | 3 | 5 | 31 | 5 |
| Total | 85 | 34 | 52 | 390 | 78 |
This page lists vulnerability statistics for all versions of Redhat » Enterprise Linux. Vulnerability statistics provide a quick overview for security vulnerabilities of Enterprise Linux. You can view versions of this product or security vulnerabilities of Redhat Enterprise Linux .
Please note that we generate vendor, product and version statistics based on CVE and CPE data and there may be inconsistencies in data sometimes or statistics may not be reliable due to certain circumstances.