CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Redhat » Enterprise Linux Desktop : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
2002 1 1
2004 22 9 9 6 2 1
2005 56 26 18 17 1 1 1 1 4
2006 3 1
2007 13 8 4 3 1 2 1
2008 11 6 1 1 1 1 1 1
2009 7 4 1 1 2 2
2010 4 4 1 1 1
2011 19 14 5 1 5 2
2012 98 43 55 23 28 9 6 5 2 1
2013 85 37 38 22 24 1 2 4 1
2014 81 38 20 11 7 2 9 9 2 2
2015 110 42 13 27 6 9 13 7
2016 171 59 37 34 9 17 11 1
2017 267 51 41 34 14 2 1 14 16 2
2018 564 101 58 108 31 1 7 4 38 40 1 1
2019 280 26 46 25 17 3 5 19 21
2020 52 4 9 6 4 4 4 3
2021 1
2022 12 3 1 1 1
2023 3 2 1 1
Total 1860 473 356 325 146 1 30 10 2 122 135 26 1 3
% Of All 25.4 19.1 17.5 7.8 0.1 1.6 0.5 0.1 6.6 7.3 1.4 0.1 0.0

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
1
22
56
3
13
11
7
4
19
98
85
81
110
171
267
564
280
52
1
12
3
  2002 1
2004 22
2005 56
2006 3
2007 13
2008 11
2009 7
2010 4
2011 19
2012 98
2013 85
2014 81
2015 110
2016 171
2017 267
2018 564
2019 280
2020 52
2021 1
2022 12
2023 3
Vulnerabilities By Type
473
356
325
122
135
146
10
26
30
2
1
1
  Denial of Service 473
Execute Code 356
Overflow 325
Bypass Something 122
Gain Information 135
Memory Corruption 146
Directory Traversal 10
Gain Privilege 26
XSS 30
Http Response Splitting 2
Sql Injection 1
CSRF 1

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all versions of Redhat Enterprise Linux Desktop. Vulnerability statistics provide a quick overview for security vulnerabilities of this software. You can view versions of this product or security vulnerabilities related to Redhat Enterprise Linux Desktop.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.