Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2017 | 5 | 2 | 13 | ||||||||
2018 | 8 | 4 | 8 | ||||||||
2020 | |||||||||||
2023 | 1 | 1 | |||||||||
Total | 14 | 7 | 21 |
Vulnerabilities by impact types
Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
---|---|---|---|---|---|
2017 | 1 | ||||
2018 | 1 | ||||
2020 | |||||
2023 | |||||
Total | 2 |
This page lists vulnerability statistics for Wireshark » Wireshark » 2.2.3 . Vulnerability statistics provide a quick overview for security vulnerabilities of Wireshark » Wireshark » version 2.2.3 .