HP : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2013 | 1 | 2 | 15 | 2 | 3 | 6 | |||||
2014 | 7 | 6 | 5 | 1 | 2 | ||||||
2015 | 12 | 1 | 4 | 3 | 2 | 1 | 3 | ||||
2016 | 11 | 2 | 6 | 2 | 2 | 1 | 12 | ||||
2017 | 1 | 1 | 5 | 3 | 1 | 3 | |||||
2018 | 16 | 3 | 4 | 22 | 9 | 5 | 3 | 1 | 3 | 89 | |
2019 | 5 | 3 | 11 | 13 | 2 | 1 | 1 | 3 | |||
2020 | 1 | 3 | 5 | 1 | 3 | 2 | |||||
2021 | 5 | 1 | 14 | 2 | |||||||
2022 | 4 | 1 | 3 | 1 | |||||||
2023 | 21 | 2 | 4 | 1 | 1 | 1 | 1 | ||||
Total | 77 | 16 | 18 | 98 | 26 | 23 | 7 | 6 | 5 | 121 |
Vulnerabilities by impact types
This page lists vulnerability statistics for all products of HP. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of HP. You can view products or security vulnerabilities of HP products.