2020 Security Vulnerability Report
CVE Statistics for 2020

Growth Curve
There have been 12547 security vulnerabilities (CVEs) published so far in 2020. In 2019 there were 16056.

The average severity is 7.1 out of 10, which decreased by 0.1 from 2019.

Products & Vendors with the most security vulnerabilities published in 2020 Vulnerabilities may exist in multiple products or vendors

By Product

#1

Microsoft Windows 10

674 vulnerabilities in 2020

#2

Microsoft Windows Server 2016

665 vulnerabilities in 2020

#3

Microsoft Windows Server 2019

629 vulnerabilities in 2020

#4

Google Android

487 vulnerabilities in 2020

#5

Microsoft Windows Server 2012

381 vulnerabilities in 2020

#6

Microsoft Windows 8.1

377 vulnerabilities in 2020

#7

Microsoft Windows Rt 8 1

373 vulnerabilities in 2020

#8

Microsoft Windows 7

331 vulnerabilities in 2020

#9

Microsoft Windows Server 2008

326 vulnerabilities in 2020

#10

GitLab

184 vulnerabilities in 2020

#11

Debian Linux

166 vulnerabilities in 2020

#12

Google Chrome

155 vulnerabilities in 2020

#13

Chadhaajay Phpkb

116 vulnerabilities in 2020

#14

Fedora Project Fedora

111 vulnerabilities in 2020

#15

OpenSuse Leap

110 vulnerabilities in 2020

#16

Canonical Ubuntu Linux

107 vulnerabilities in 2020

#17

Apple iOS

106 vulnerabilities in 2020

#18

Apple Mac OSX

98 vulnerabilities in 2020

#19

Mozilla Firefox

92 vulnerabilities in 2020

#20

Microsoft Sharepoint Enterprise Server

91 vulnerabilities in 2020

By Vendor

#1

Microsoft

931 vulnerabilities in 2020

#2

Google

649 vulnerabilities in 2020

#3

Oracle

603 vulnerabilities in 2020

#4

IBM

240 vulnerabilities in 2020

#5

Cisco

196 vulnerabilities in 2020

#6

GitLab

184 vulnerabilities in 2020

#7

Red Hat

182 vulnerabilities in 2020

#8

Debian

166 vulnerabilities in 2020

#9

Apple

156 vulnerabilities in 2020

#10

OpenSuse

142 vulnerabilities in 2020

#11

Jenkins

129 vulnerabilities in 2020

#12

Chadhaajay

116 vulnerabilities in 2020

#13

SAP

116 vulnerabilities in 2020

#14

Fedora Project

111 vulnerabilities in 2020

#15

Canonical

111 vulnerabilities in 2020

#16

Mozilla

102 vulnerabilities in 2020

#17

Apache

94 vulnerabilities in 2020

#18

Linux

79 vulnerabilities in 2020

#19

F5 Networks

76 vulnerabilities in 2020

#20

Atlassian

64 vulnerabilities in 2020

By Weakness

#1
XSS
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
1442
 
11.5%
#2
Improper Privilege Management
The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
835
 
6.7%
#3
Information Leak
An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.
824
 
6.6%
#4
Improper Input Validation
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
786
 
6.3%
#5
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
593
 
4.7%
#6
Memory Corruption
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
454
 
3.6%
#7
Out-of-bounds Read
The software reads data past the end, or before the beginning, of the intended buffer.
397
 
3.2%
#8
Shell injection
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
366
 
2.9%
#9
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
281
 
2.2%
#10
buffer overrun
The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
280
 
2.2%
#11
Directory traversal
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
265
 
2.1%
#12
Downstream Injection
The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
247
 
2.0%
#13
authentification
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
236
 
1.9%
#14
Dangling pointer
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
209
 
1.7%
#15
Incorrect Default Permissions
The software, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor.
198
 
1.6%
#16
Uncontrolled Resource Consumption ('Resource Exhaustion')
The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.
197
 
1.6%
#17
AuthZ
The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
195
 
1.6%
#18
Insufficiently Protected Credentials
This weakness occurs when the application transmits or stores authentication credentials and uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
167
 
1.3%
#19
Unrestricted File Upload
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
137
 
1.1%
#20
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
122
 
1.0%
#21
Use of Hard-coded Credentials
The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
116
 
0.9%
#22
Incorrect Permission Assignment for Critical Resource
The software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
112
 
0.9%
#23
AuthZ
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
111
 
0.9%
#24
Marshaling, Unmarshaling
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
109
 
0.9%
#25
Integer Overflow or Wraparound
The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
104
 
0.8%

By Category

Content Management

Joomla

24 vulnerabilities in 2020

WordPress

12 vulnerabilities in 2020

TYPO3

9 vulnerabilities in 2020

Database

Oracle MySQL

83 vulnerabilities in 2020

Oracle Database Server

14 vulnerabilities in 2020

SQLite

11 vulnerabilities in 2020

Desktop Software

Mozilla Thunderbird

55 vulnerabilities in 2020

Microsoft Office

45 vulnerabilities in 2020

Apple iTunes

33 vulnerabilities in 2020

Development Tools

Oracle Java Development Kit (JDK)

21 vulnerabilities in 2020

Jenkins

18 vulnerabilities in 2020

Microsoft Visual Studio

10 vulnerabilities in 2020

DevOps

GitLab

184 vulnerabilities in 2020

Kubernetes

9 vulnerabilities in 2020

Docker

1 vulnerability in 2020

Email

Microsoft Exchange Server

3 vulnerabilities in 2020

Postfix

1 vulnerability in 2020

Exim

1 vulnerability in 2020

Front End Libraries

jQuery

3 vulnerabilities in 2020

Angular JS AngularJS

2 vulnerabilities in 2020

Java Application Servers

Oracle Weblogic Server

37 vulnerabilities in 2020

IBM WebSphere Application Server

17 vulnerabilities in 2020

Apache Tomcat

7 vulnerabilities in 2020

Java Libraries

FasterXML Jackson Databind

21 vulnerabilities in 2020

Libraries

Microsoft ChakraCore

29 vulnerabilities in 2020

Microsoft .NET Core

4 vulnerabilities in 2020

libming Ming

4 vulnerabilities in 2020

Operating Systems

Microsoft Windows 10

674 vulnerabilities in 2020

Microsoft Windows Server 2016

665 vulnerabilities in 2020

Microsoft Windows Server 2019

629 vulnerabilities in 2020

Runtime Environments

Oracle Java Runtime Environment (JRE)

21 vulnerabilities in 2020

Oracle OpenJDK

20 vulnerabilities in 2020

PHP

10 vulnerabilities in 2020

Server Software

Microsoft Sharepoint Enterprise Server

91 vulnerabilities in 2020

Microsoft Sharepoint Server

90 vulnerabilities in 2020

OpenBSD OpenSSH

2 vulnerabilities in 2020

Virtualization

Oracle VM VirtualBox

62 vulnerabilities in 2020

QEMU

25 vulnerabilities in 2020

Web Application Framework

Django Project Django

6 vulnerabilities in 2020

Microsoft ASP.NET Core

5 vulnerabilities in 2020

Laravel

2 vulnerabilities in 2020

Web Browsers

Google Chrome

155 vulnerabilities in 2020

Mozilla Firefox

92 vulnerabilities in 2020

Web Servers

Apache HTTP Server

7 vulnerabilities in 2020

nginx

1 vulnerability in 2020

Caddy Server Caddy Web Server

1 vulnerability in 2020


Report Last Updated: September 29, 2020