CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Suse : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
1999 18 5 7 4
2000 18 2 4 4 1 1 8
2001 21 5 8 5 1 6
2002 9 1 3 3 1 4
2003 4 1
2004 33 11 12 11 1 3
2005 82 29 29 26 1 2 1 11 2 2
2006 9 5 1 1 1
2007 11 1 2 1 1 1
2008 8 4 2 1 2
2009 14 7 1 1 1 2 2 4
2010 61 27 5 11 5 1 3 20 8 2
2011 14 9 3 6 2 1 2 1 2
2012 91 51 60 24 38 10 7 5 3 1
2013 72 35 47 24 26 1 4 3 1
2014 100 51 25 16 10 1 3 1 14 15 9 4
2015 57 22 22 6 12 2 3 7 2
2016 98 64 20 38 5 1 1 11 9
2017 43 18 3 8 1 1
2018 33 5 3 5 2 2 1
2019 6 2
2020 31 2 5 4 2 1 3
2021 3 1
Total 836 351 261 202 101 5 22 5 1 63 69 58 1 8
% Of All 42.0 31.2 24.2 12.1 0.6 2.6 0.6 0.1 7.5 8.3 6.9 0.1 0.0

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
18
18
21
9
4
33
82
9
11
8
14
61
14
91
72
100
57
98
43
33
6
31
3
  1999 18
2000 18
2001 21
2002 9
2003 4
2004 33
2005 82
2006 9
2007 11
2008 8
2009 14
2010 61
2011 14
2012 91
2013 72
2014 100
2015 57
2016 98
2017 43
2018 33
2019 6
2020 31
2021 3
Vulnerabilities By Type
351
202
58
261
63
69
101
22
5
1
5
1
  Denial of Service 351
Overflow 202
Gain Privilege 58
Execute Code 261
Bypass Something 63
Gain Information 69
Memory Corruption 101
XSS 22
Directory Traversal 5
CSRF 1
Sql Injection 5
Http Response Splitting 1

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all products of Suse. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of this vendor. You can view products of this vendor or security vulnerabilities related to products of Suse.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.