Libjpeg-turbo : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2017 | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
2018 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
2019 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
2020 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
2021 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
2022 | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
2023 | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 5 | 8 |
Vulnerabilities by impact types
This page lists vulnerability statistics for all products of Libjpeg-turbo. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Libjpeg-turbo. You can view products or security vulnerabilities of Libjpeg-turbo products.