F5 : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2015 | 0 | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
2016 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
2017 | 4 | 0 | 1 | 2 | 0 | 0 | 0 | 0 | 1 | 0 | 14 |
2018 | 0 | 1 | 0 | 5 | 0 | 0 | 2 | 0 | 0 | 1 | 29 |
2019 | 11 | 10 | 1 | 15 | 0 | 0 | 2 | 0 | 0 | 0 | 4 |
2020 | 1 | 3 | 1 | 14 | 1 | 0 | 4 | 0 | 0 | 1 | 1 |
2021 | 4 | 1 | 1 | 11 | 1 | 1 | 2 | 0 | 1 | 2 | 12 |
2022 | 2 | 7 | 0 | 7 | 4 | 0 | 2 | 1 | 0 | 0 | 12 |
2023 | 2 | 1 | 1 | 3 | 2 | 0 | 0 | 0 | 0 | 1 | 0 |
2024 | 1 | 0 | 2 | 4 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
2025 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 25 | 26 | 7 | 63 | 10 | 1 | 12 | 1 | 2 | 6 | 72 |
Vulnerabilities by impact types
This page lists vulnerability statistics for all products of F5. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of F5. You can view products or security vulnerabilities of F5 products.