Dlink : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2013 | 1 | 1 | 2 | ||||||||
2014 | 2 | 1 | 4 | 1 | 1 | ||||||
2015 | 1 | 3 | 5 | 1 | |||||||
2016 | 1 | ||||||||||
2017 | 2 | 6 | 4 | 3 | 3 | ||||||
2018 | 6 | 3 | 11 | 2 | 2 | ||||||
2019 | 7 | 4 | 2 | 10 | 1 | 5 | 2 | 2 | |||
2020 | 6 | 6 | 1 | 5 | 2 | 2 | |||||
2021 | 17 | 19 | 3 | 1 | |||||||
2022 | 16 | 40 | 2 | 2 | 2 | 1 | |||||
2023 | 46 | 67 | 7 | 1 | |||||||
Total | 105 | 139 | 11 | 43 | 13 | 3 | 20 | 2 | 1 | 8 |
Vulnerabilities by impact types
This page lists vulnerability statistics for all products of Dlink. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Dlink. You can view products or security vulnerabilities of Dlink products.