Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2015 | 1 | ||||||||||
2016 | 1 | 5 | 1 | ||||||||
2017 | 1 | ||||||||||
2018 | 3 | 1 | 1 | ||||||||
2019 | |||||||||||
2022 | |||||||||||
Total | 2 | 9 | 1 | 2 |
Vulnerabilities by impact types
Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
---|---|---|---|---|---|
2015 | 1 | 1 | |||
2016 | 2 | 1 | |||
2017 | |||||
2018 | 4 | 16 | |||
2019 | 1 | 1 | |||
2022 | |||||
Total | 2 | 5 | 1 | 17 | 2 |
This page lists vulnerability statistics for Redhat » Satellite » 5.7 . Vulnerability statistics provide a quick overview for security vulnerabilities of Redhat » Satellite » version 5.7 .