Redhat : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2015 | 22 | 47 | 1 | 9 | 4 | 0 | 3 | 7 | 1 | 0 | 0 |
2016 | 29 | 34 | 2 | 9 | 2 | 0 | 4 | 0 | 1 | 1 | 0 |
2017 | 35 | 46 | 0 | 15 | 3 | 1 | 5 | 2 | 2 | 1 | 37 |
2018 | 148 | 193 | 3 | 27 | 21 | 4 | 5 | 4 | 1 | 3 | 109 |
2019 | 56 | 108 | 3 | 36 | 17 | 0 | 14 | 3 | 1 | 2 | 47 |
2020 | 26 | 44 | 2 | 25 | 9 | 2 | 4 | 2 | 2 | 2 | 22 |
2021 | 34 | 45 | 1 | 12 | 3 | 0 | 3 | 0 | 2 | 1 | 17 |
2022 | 26 | 62 | 3 | 11 | 4 | 0 | 0 | 3 | 3 | 2 | 10 |
2023 | 22 | 52 | 1 | 13 | 9 | 0 | 2 | 0 | 1 | 2 | 4 |
2024 | 10 | 29 | 0 | 4 | 4 | 0 | 3 | 0 | 3 | 3 | 0 |
2025 | 11 | 19 | 0 | 5 | 3 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 419 | 679 | 16 | 166 | 79 | 7 | 43 | 21 | 17 | 17 | 246 |
Vulnerabilities by impact types
Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
---|---|---|---|---|---|
2015 | 46 | 0 | 0 | 105 | 0 |
2016 | 47 | 0 | 0 | 101 | 2 |
2017 | 27 | 22 | 13 | 89 | 27 |
2018 | 59 | 39 | 57 | 176 | 80 |
2019 | 51 | 30 | 29 | 188 | 45 |
2020 | 26 | 12 | 20 | 44 | 22 |
2021 | 10 | 15 | 18 | 41 | 18 |
2022 | 17 | 12 | 20 | 57 | 21 |
2023 | 15 | 10 | 15 | 70 | 15 |
2024 | 7 | 7 | 11 | 61 | 6 |
2025 | 1 | 4 | 7 | 16 | 1 |
Total | 306 | 151 | 190 | 948 | 237 |
This page lists vulnerability statistics for all products of Redhat. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Redhat. You can view products or security vulnerabilities of Redhat products.