2019 Security Vulnerability Report
CVE Statistics for 2019

Growth Curve
There were 16030 security vulnerabilities (CVEs) published in 2019. In 2018 there were 12728.

The average severity was 7.3 out of 10, which was about the same as in 2018.

Products & Vendors with the most security vulnerabilities published in 2019 Vulnerabilities may exist in multiple products or vendors

By Product

#1

Google Android

491 vulnerabilities in 2019

#2

Debian Linux

479 vulnerabilities in 2019

#3

Microsoft Windows 10

448 vulnerabilities in 2019

#4

Microsoft Windows Server 2016

443 vulnerabilities in 2019

#5

Microsoft Windows Server 2019

433 vulnerabilities in 2019

#6

Apple iOS

346 vulnerabilities in 2019

#7

Microsoft Windows 7

321 vulnerabilities in 2019

#8

Microsoft Windows Server 2008

314 vulnerabilities in 2019

#9

Microsoft Windows Server 2012

314 vulnerabilities in 2019

#10

Microsoft Windows 8.1

310 vulnerabilities in 2019

#11

Google Chrome

303 vulnerabilities in 2019

#12

Apple Mac OSX

298 vulnerabilities in 2019

#13

Microsoft Windows Rt 8 1

296 vulnerabilities in 2019

#14

Canonical Ubuntu Linux

292 vulnerabilities in 2019

#15

Fedora Project Fedora

286 vulnerabilities in 2019

#16

Linux Kernel

265 vulnerabilities in 2019

#17

Apple TV OS

249 vulnerabilities in 2019

#18

OpenSuse Leap

241 vulnerabilities in 2019

#19

Apple Watch OS

200 vulnerabilities in 2019

#20

Red Hat Enterprise Linux Server

174 vulnerabilities in 2019

By Vendor

#1

Google

808 vulnerabilities in 2019

#2

Microsoft

759 vulnerabilities in 2019

#3

Oracle

633 vulnerabilities in 2019

#4

Apple

514 vulnerabilities in 2019

#5

Debian

479 vulnerabilities in 2019

#6

IBM

438 vulnerabilities in 2019

#7

Red Hat

379 vulnerabilities in 2019

#8

Cisco

355 vulnerabilities in 2019

#9

Jenkins

340 vulnerabilities in 2019

#10

Canonical

294 vulnerabilities in 2019

#11

Fedora Project

291 vulnerabilities in 2019

#12

Linux

266 vulnerabilities in 2019

#13

OpenSuse

250 vulnerabilities in 2019

#14

GitLab

165 vulnerabilities in 2019

#15

Intel

150 vulnerabilities in 2019

#16

NetApp

140 vulnerabilities in 2019

#17

Apache

140 vulnerabilities in 2019

#18

HP

139 vulnerabilities in 2019

#19

Magento

137 vulnerabilities in 2019

#20

cPanel

125 vulnerabilities in 2019

By Weakness

#1
XSS
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
1753
 
10.9%
#2
Improper Input Validation
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
1568
 
9.8%
#3
Memory Corruption
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
1281
 
8.0%
#4
Information Leak
An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.
1074
 
6.7%
#5
Out-of-bounds Read
The software reads data past the end, or before the beginning, of the intended buffer.
759
 
4.7%
#6
Authorization
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
708
 
4.4%
#7
Dangling pointer
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
540
 
3.4%
#8
Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
467
 
2.9%
#9
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
436
 
2.7%
#10
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
410
 
2.6%
#11
Directory traversal
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
352
 
2.2%
#12
authentification
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
295
 
1.8%
#13
Uncontrolled Resource Consumption ('Resource Exhaustion')
The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.
279
 
1.7%
#14
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
240
 
1.5%
#15
Improper Neutralization of Special Elements used in a Command ('Command Injection')
The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
239
 
1.5%
#16
Credentials Management
Weaknesses in this category are related to the management of credentials.
235
 
1.5%
#17
Improper Privilege Management
The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
232
 
1.4%
#18
Incorrect Permission Assignment for Critical Resource
The software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
201
 
1.3%
#19
Downstream Injection
The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
191
 
1.2%
#20
Shell injection
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
186
 
1.2%
#21
Integer Overflow or Wraparound
The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
182
 
1.1%
#22
Unrestricted File Upload
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
174
 
1.1%
#23
Security Features
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
145
 
0.9%
#24
XXE
The software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
119
 
0.7%
#25
Improper Control of Generation of Code ('Code Injection')
The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
114
 
0.7%

By Category

Content Management

Joomla

27 vulnerabilities in 2019

WordPress

22 vulnerabilities in 2019

MediaWiki

12 vulnerabilities in 2019

Database

Oracle MySQL

136 vulnerabilities in 2019

Oracle Database Server

21 vulnerabilities in 2019

SQLite

18 vulnerabilities in 2019

Desktop Software

Apple iTunes

92 vulnerabilities in 2019

Mozilla Thunderbird

57 vulnerabilities in 2019

Microsoft Office

56 vulnerabilities in 2019

Development Tools

Oracle Java Development Kit (JDK)

36 vulnerabilities in 2019

Jenkins

21 vulnerabilities in 2019

Microsoft Visual Studio

4 vulnerabilities in 2019

DevOps

GitLab

164 vulnerabilities in 2019

Kubernetes

13 vulnerabilities in 2019

Docker

6 vulnerabilities in 2019

Email

Microsoft Exchange Server

12 vulnerabilities in 2019

Exim

4 vulnerabilities in 2019

Front End Libraries

jQuery

1 vulnerability in 2019

Angular JS AngularJS

1 vulnerability in 2019

Java Application Servers

Oracle Weblogic Server

25 vulnerabilities in 2019

IBM WebSphere Application Server

18 vulnerabilities in 2019

Adobe ColdFusion

10 vulnerabilities in 2019

Java Libraries

FasterXML Jackson Databind

21 vulnerabilities in 2019

Libraries

Microsoft ChakraCore

71 vulnerabilities in 2019

OpenSSL

8 vulnerabilities in 2019

Google Tensorflow

7 vulnerabilities in 2019

Operating Systems

Google Android

491 vulnerabilities in 2019

Debian Linux

479 vulnerabilities in 2019

Microsoft Windows 10

448 vulnerabilities in 2019

Runtime Environments

Oracle Java Runtime Environment (JRE)

36 vulnerabilities in 2019

PHP

29 vulnerabilities in 2019

Python

11 vulnerabilities in 2019

Server Software

Microsoft Sharepoint Server

33 vulnerabilities in 2019

Microsoft Sharepoint Enterprise Server

32 vulnerabilities in 2019

OpenBSD OpenSSH

5 vulnerabilities in 2019

Virtualization

Oracle VM VirtualBox

62 vulnerabilities in 2019

QEMU

16 vulnerabilities in 2019

Web Application Framework

Django Project Django

10 vulnerabilities in 2019

Microsoft ASP.NET Core

6 vulnerabilities in 2019

Web Browsers

Google Chrome

303 vulnerabilities in 2019

Apple Safari

166 vulnerabilities in 2019

Mozilla Firefox

107 vulnerabilities in 2019

Web Servers

Apache HTTP Server

14 vulnerabilities in 2019


Report Last Updated: July 10, 2020