Redhat : Vulnerability Statistics
Vulnerability Trends Over Time
| Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 2013 | 42 | 47 | 2 | 11 | 1 | 2 | 1 | 1 | 25 | ||
| 2014 | 26 | 45 | 2 | 21 | 3 | 1 | 10 | 2 | 21 | ||
| 2015 | 43 | 49 | 1 | 9 | 4 | 3 | 7 | 1 | 13 | ||
| 2016 | 44 | 50 | 2 | 9 | 1 | 4 | 1 | 2 | 23 | ||
| 2017 | 36 | 46 | 14 | 3 | 1 | 5 | 2 | 2 | 1 | 37 | |
| 2018 | 152 | 198 | 3 | 27 | 21 | 4 | 5 | 4 | 1 | 3 | 111 |
| 2019 | 58 | 109 | 3 | 36 | 17 | 14 | 3 | 1 | 2 | 47 | |
| 2020 | 26 | 44 | 2 | 25 | 9 | 2 | 4 | 2 | 2 | 2 | 22 |
| 2021 | 35 | 45 | 1 | 12 | 3 | 3 | 2 | 1 | 18 | ||
| 2022 | 26 | 66 | 3 | 11 | 4 | 3 | 3 | 2 | 13 | ||
| 2023 | 14 | 38 | 1 | 4 | 5 | 1 | 1 | 1 | 1 | 6 | |
| Total | 502 | 737 | 20 | 179 | 71 | 8 | 42 | 32 | 14 | 17 | 336 |
Vulnerabilities by impact types
| Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
|---|---|---|---|---|---|
| 2013 | 46 | 8 | 8 | 97 | 15 |
| 2014 | 37 | 4 | 4 | 104 | 24 |
| 2015 | 42 | 2 | 2 | 105 | 14 |
| 2016 | 44 | 27 | 27 | 97 | 32 |
| 2017 | 26 | 22 | 13 | 87 | 27 |
| 2018 | 59 | 40 | 57 | 176 | 81 |
| 2019 | 49 | 31 | 30 | 187 | 46 |
| 2020 | 26 | 12 | 20 | 44 | 22 |
| 2021 | 10 | 15 | 18 | 41 | 18 |
| 2022 | 17 | 12 | 20 | 57 | 22 |
| 2023 | 6 | 5 | 8 | 35 | 10 |
| Total | 362 | 178 | 207 | 1030 | 311 |
This page lists vulnerability statistics for all products of Redhat. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Redhat. You can view products or security vulnerabilities of Redhat products.