CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

SUN : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
1999 54 7 4 19 13 1
2000 26 2 6 9 1 1 6
2001 57 6 17 28 3 2 1 16
2002 56 12 16 15 1 7 3 9
2003 63 22 12 16 1 3 3 10 1
2004 49 16 16 11 2 1 5
2005 75 21 6 3 5 3 2 5 15
2006 86 30 11 8 1 7 1 8 2 10
2007 107 46 12 8 1 7 1 3 3 8 1
2008 144 47 27 19 1 9 3 12 10 18 1 1 1
2009 184 70 30 24 2 1 14 1 1 13 17 20 1
2010 76 9 13 13 1 2 4 1 1 1
2011 101 3 2 1 1
2012 109 13 3 6 1 1
2013 167 1 4 3 4 1 21 1
2014 28
2015 14
2020 3 1 1
2021 3 2 1
Total 1402 305 179 184 10 1 48 25 2 74 41 132 2 1 7
% Of All 21.8 12.8 13.1 0.7 0.1 3.4 1.8 0.1 5.3 2.9 9.4 0.1 0.1

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
54
26
57
56
63
49
75
86
107
144
184
76
101
109
167
28
14
3
3
  1999 54
2000 26
2001 57
2002 56
2003 63
2004 49
2005 75
2006 86
2007 107
2008 144
2009 184
2010 76
2011 101
2012 109
2013 167
2014 28
2015 14
2020 3
2021 3
Vulnerabilities By Type
305
179
184
132
25
74
41
48
10
2
2
1
1
  Denial of Service 305
Execute Code 179
Overflow 184
Gain Privilege 132
Directory Traversal 25
Bypass Something 74
Gain Information 41
XSS 48
Memory Corruption 10
Http Response Splitting 2
CSRF 2
File Inclusion 1
Sql Injection 1

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all products of SUN. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of this vendor. You can view products of this vendor or security vulnerabilities related to products of SUN.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.