Citrix : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2013 | 1 | ||||||||||
2014 | 3 | 3 | 1 | ||||||||
2015 | 4 | 1 | |||||||||
2016 | 2 | 1 | 2 | 2 | |||||||
2017 | 4 | 1 | 1 | 9 | |||||||
2018 | 1 | 2 | 1 | 3 | 4 | 1 | 1 | 1 | 1 | ||
2019 | 1 | 1 | 2 | 1 | 1 | ||||||
2020 | 1 | 5 | 6 | 3 | |||||||
2021 | |||||||||||
2022 | 2 | 1 | 1 | 1 | |||||||
2023 | 2 | 2 | 1 | ||||||||
Total | 13 | 3 | 4 | 21 | 13 | 1 | 2 | 3 | 1 | 2 | 18 |
Vulnerabilities by impact types
This page lists vulnerability statistics for all products of Citrix. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Citrix. You can view products or security vulnerabilities of Citrix products.