Horde : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2014 | 7 | ||||||||||
2015 | 1 | ||||||||||
2016 | 3 | ||||||||||
2017 | 3 | 1 | 2 | ||||||||
2018 | |||||||||||
2019 | 3 | 1 | 4 | ||||||||
2020 | 2 | 1 | |||||||||
2021 | 1 | ||||||||||
2022 | 1 | 1 | |||||||||
Total | 20 | 2 | 7 | 2 |
Vulnerabilities by impact types
Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
---|---|---|---|---|---|
2014 | |||||
2015 | |||||
2016 | |||||
2017 | 3 | 1 | |||
2018 | 1 | 1 | |||
2019 | 1 | ||||
2020 | 3 | ||||
2021 | |||||
2022 | |||||
Total | 7 | 1 | 1 | 1 |
This page lists vulnerability statistics for all products of Horde. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Horde. You can view products or security vulnerabilities of Horde products.