CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Fedoraproject : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
2006 1
2007 9 2 2 2 2 1 1 1
2008 11 2 2 1 2 1 1 2
2009 21 8 3 1 2 3 2 3 1
2010 30 22 6 5 6 4 2 3 1
2011 25 14 4 8 1 2 1 1 2
2012 14 5 3 2 2 3
2013 47 23 10 8 4 2 5 5
2014 91 47 26 20 7 1 4 3 8 8 7 2 3
2015 153 83 30 57 7 2 6 2 11 20 6 3
2016 136 59 20 43 7 1 10 1 3 4 22 8 2
2017 118 56 16 13 2 2 1 6 6 2 4 2
2018 92 21 9 18 1 6 5 1 1
2019 500 90 53 58 3 3 12 7 40 27 4
2020 634 96 43 70 9 5 26 4 1 38 47 12 1
2021 1111 152 135 169 20 4 27 22 60 36 4 3
2022 308 43 30 66 3 5 13 2 11 9 9 8
Total 3301 723 392 539 69 24 106 42 4 203 194 62 28 2 6
% Of All 21.9 11.9 16.3 2.1 0.7 3.2 1.3 0.1 6.1 5.9 1.9 0.8 0.1

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
1
9
11
21
30
25
14
47
91
153
136
118
92
500
634
1111
308
  2006 1
2007 9
2008 11
2009 21
2010 30
2011 25
2012 14
2013 47
2014 91
2015 153
2016 136
2017 118
2018 92
2019 500
2020 634
2021 1111
2022 308
Vulnerabilities By Type
723
392
539
203
194
62
28
24
106
69
42
4
2
  Denial of Service 723
Execute Code 392
Overflow 539
Bypass Something 203
Gain Information 194
Gain Privilege 62
CSRF 28
Sql Injection 24
XSS 106
Memory Corruption 69
Directory Traversal 42
Http Response Splitting 4
File Inclusion 2

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all products of Fedoraproject. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of this vendor. You can view products of this vendor or security vulnerabilities related to products of Fedoraproject.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.