2019 Security Vulnerability Report
CVE Statistics for 2019
The average severity was 7.3 out of 10, which was about the same as in 2018.
Products & Vendors with the most security vulnerabilities published in 2019 Vulnerabilities may exist in multiple products or vendors
443 vulnerabilities in 2019
433 vulnerabilities in 2019
346 vulnerabilities in 2019
321 vulnerabilities in 2019
314 vulnerabilities in 2019
314 vulnerabilities in 2019
310 vulnerabilities in 2019
302 vulnerabilities in 2019
299 vulnerabilities in 2019
296 vulnerabilities in 2019
292 vulnerabilities in 2019
265 vulnerabilities in 2019
257 vulnerabilities in 2019
250 vulnerabilities in 2019
200 vulnerabilities in 2019
176 vulnerabilities in 2019
808 vulnerabilities in 2019
759 vulnerabilities in 2019
634 vulnerabilities in 2019
514 vulnerabilities in 2019
508 vulnerabilities in 2019
438 vulnerabilities in 2019
385 vulnerabilities in 2019
354 vulnerabilities in 2019
340 vulnerabilities in 2019
304 vulnerabilities in 2019
297 vulnerabilities in 2019
267 vulnerabilities in 2019
266 vulnerabilities in 2019
165 vulnerabilities in 2019
150 vulnerabilities in 2019
141 vulnerabilities in 2019
141 vulnerabilities in 2019
139 vulnerabilities in 2019
137 vulnerabilities in 2019
125 vulnerabilities in 2019
XSSThe software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Improper Input ValidationThe product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
Out-of-bounds ReadThe software reads data past the end, or before the beginning, of the intended buffer.
Information LeakAn information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.
Memory CorruptionThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Dangling pointerReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
Directory traversalThe software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Shell injectionThe software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
NULL Pointer DereferenceA NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
authentificationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Incorrect Permission Assignment for Critical ResourceThe software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Unrestricted File UploadThe software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Uncontrolled Resource Consumption ('Resource Exhaustion')The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.
XXEThe software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Marshaling, UnmarshalingThe application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
AuthZThe software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Missing Authentication for Critical FunctionThe software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Insufficiently Protected CredentialsThis weakness occurs when the application transmits or stores authentication credentials and uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
buffer overrunThe program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Use of Hard-coded CredentialsThe software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
Java Application Servers
Web Application Framework
Report Last Updated: October 24, 2020