2019 Security Vulnerability Report
CVE Statistics for 2019

Growth Curve
There were 16056 security vulnerabilities (CVEs) published in 2019. In 2018 there were 12781.

The average severity was 7.3 out of 10, which was about the same as in 2018.

Products & Vendors with the most security vulnerabilities published in 2019 Vulnerabilities may exist in multiple products or vendors

By Product

#1

Debian Linux

508 vulnerabilities in 2019

#2

Google Android

491 vulnerabilities in 2019

#3

Microsoft Windows 10

448 vulnerabilities in 2019

#4

Microsoft Windows Server 2016

443 vulnerabilities in 2019

#5

Microsoft Windows Server 2019

433 vulnerabilities in 2019

#6

Apple iOS

346 vulnerabilities in 2019

#7

Microsoft Windows 7

321 vulnerabilities in 2019

#8

Microsoft Windows Server 2008

314 vulnerabilities in 2019

#9

Microsoft Windows Server 2012

314 vulnerabilities in 2019

#10

Microsoft Windows 8.1

310 vulnerabilities in 2019

#11

Google Chrome

303 vulnerabilities in 2019

#12

Canonical Ubuntu Linux

302 vulnerabilities in 2019

#13

Apple Mac OSX

299 vulnerabilities in 2019

#14

Microsoft Windows Rt 8 1

296 vulnerabilities in 2019

#15

Fedora Project Fedora

292 vulnerabilities in 2019

#16

Linux Kernel

265 vulnerabilities in 2019

#17

OpenSuse Leap

257 vulnerabilities in 2019

#18

Apple TV OS

250 vulnerabilities in 2019

#19

Apple Watch OS

200 vulnerabilities in 2019

#20

Red Hat Enterprise Linux Server

176 vulnerabilities in 2019

By Vendor

#1

Google

808 vulnerabilities in 2019

#2

Microsoft

759 vulnerabilities in 2019

#3

Oracle

634 vulnerabilities in 2019

#4

Apple

514 vulnerabilities in 2019

#5

Debian

508 vulnerabilities in 2019

#6

IBM

438 vulnerabilities in 2019

#7

Red Hat

385 vulnerabilities in 2019

#8

Cisco

354 vulnerabilities in 2019

#9

Jenkins

340 vulnerabilities in 2019

#10

Canonical

304 vulnerabilities in 2019

#11

Fedora Project

297 vulnerabilities in 2019

#12

OpenSuse

267 vulnerabilities in 2019

#13

Linux

266 vulnerabilities in 2019

#14

GitLab

165 vulnerabilities in 2019

#15

Intel

150 vulnerabilities in 2019

#16

Apache

141 vulnerabilities in 2019

#17

NetApp

141 vulnerabilities in 2019

#18

HP

139 vulnerabilities in 2019

#19

Magento

137 vulnerabilities in 2019

#20

cPanel

125 vulnerabilities in 2019

By Weakness

#1
XSS
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
1809
 
11.3%
#2
Improper Input Validation
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
1006
 
6.3%
#3
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
1005
 
6.3%
#4
Out-of-bounds Read
The software reads data past the end, or before the beginning, of the intended buffer.
820
 
5.1%
#5
Information Leak
An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.
685
 
4.3%
#6
Memory Corruption
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
609
 
3.8%
#7
Dangling pointer
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
502
 
3.1%
#8
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
439
 
2.7%
#9
Directory traversal
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
380
 
2.4%
#10
Shell injection
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
325
 
2.0%
#11
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
235
 
1.5%
#12
authentification
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
216
 
1.3%
#13
Incorrect Permission Assignment for Critical Resource
The software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
185
 
1.2%
#14
Unrestricted File Upload
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
184
 
1.1%
#15
Improper Control of Generation of Code ('Code Injection')
The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
147
 
0.9%
#16
Integer Overflow or Wraparound
The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
144
 
0.9%
#17
Improper Privilege Management
The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
136
 
0.8%
#18
Uncontrolled Resource Consumption ('Resource Exhaustion')
The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.
134
 
0.8%
#19
XXE
The software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
122
 
0.8%
#20
Marshaling, Unmarshaling
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
119
 
0.7%
#21
AuthZ
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
119
 
0.7%
#22
Missing Authentication for Critical Function
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
117
 
0.7%
#23
Insufficiently Protected Credentials
This weakness occurs when the application transmits or stores authentication credentials and uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
117
 
0.7%
#24
buffer overrun
The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
110
 
0.7%
#25
Use of Hard-coded Credentials
The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
105
 
0.7%

By Category

Content Management

Joomla

27 vulnerabilities in 2019

WordPress

22 vulnerabilities in 2019

MediaWiki

12 vulnerabilities in 2019

Database

Oracle MySQL

136 vulnerabilities in 2019

Oracle Database Server

21 vulnerabilities in 2019

SQLite

18 vulnerabilities in 2019

Desktop Software

Apple iTunes

92 vulnerabilities in 2019

Mozilla Thunderbird

57 vulnerabilities in 2019

Microsoft Office

56 vulnerabilities in 2019

Development Tools

Oracle Java Development Kit (JDK)

30 vulnerabilities in 2019

Jenkins

21 vulnerabilities in 2019

Microsoft Visual Studio

4 vulnerabilities in 2019

DevOps

GitLab

164 vulnerabilities in 2019

Kubernetes

13 vulnerabilities in 2019

Docker

6 vulnerabilities in 2019

Email

Microsoft Exchange Server

12 vulnerabilities in 2019

Exim

4 vulnerabilities in 2019

Front End Libraries

jQuery

1 vulnerability in 2019

Angular JS AngularJS

1 vulnerability in 2019

Java Application Servers

Oracle Weblogic Server

25 vulnerabilities in 2019

IBM WebSphere Application Server

18 vulnerabilities in 2019

Adobe ColdFusion

10 vulnerabilities in 2019

Java Libraries

FasterXML Jackson Databind

21 vulnerabilities in 2019

Libraries

Microsoft ChakraCore

71 vulnerabilities in 2019

OpenSSL

8 vulnerabilities in 2019

Google Tensorflow

7 vulnerabilities in 2019

Operating Systems

Debian Linux

508 vulnerabilities in 2019

Google Android

491 vulnerabilities in 2019

Microsoft Windows 10

448 vulnerabilities in 2019

Runtime Environments

Oracle Java Runtime Environment (JRE)

36 vulnerabilities in 2019

PHP

29 vulnerabilities in 2019

Python

11 vulnerabilities in 2019

Server Software

Microsoft Sharepoint Server

33 vulnerabilities in 2019

Microsoft Sharepoint Enterprise Server

32 vulnerabilities in 2019

OpenBSD OpenSSH

5 vulnerabilities in 2019

Virtualization

Oracle VM VirtualBox

62 vulnerabilities in 2019

QEMU

16 vulnerabilities in 2019

Web Application Framework

Django Project Django

10 vulnerabilities in 2019

Microsoft ASP.NET Core

6 vulnerabilities in 2019

Web Browsers

Google Chrome

303 vulnerabilities in 2019

Apple Safari

166 vulnerabilities in 2019

Mozilla Firefox

107 vulnerabilities in 2019

Web Servers

Apache HTTP Server

14 vulnerabilities in 2019


Report Last Updated: October 24, 2020