2021 Security Vulnerability Report
CVE Statistics for 2021

Growth Curve
There have been 1225 security vulnerabilities (CVEs) published so far in 2021. In 2020 there were 17003.

The average severity is 7.1 out of 10, which was about the same as in 2020.

Products & Vendors with the most security vulnerabilities published in 2021 Vulnerabilities may exist in multiple products or vendors

By Product

#1

Microsoft Windows 10

63 vulnerabilities in 2021

#2

Microsoft Windows Server 2016

59 vulnerabilities in 2021

#3

Microsoft Windows Server 2019

53 vulnerabilities in 2021

#4

Microsoft Windows 8.1

42 vulnerabilities in 2021

#5

Microsoft Windows Server 2012

42 vulnerabilities in 2021

#6

Microsoft Windows Rt 8 1

39 vulnerabilities in 2021

#7

Oracle MySQL

37 vulnerabilities in 2021

#8

Google Chrome

36 vulnerabilities in 2021

#9

Microsoft Windows 7

35 vulnerabilities in 2021

#10

Microsoft Windows Server 2008

35 vulnerabilities in 2021

#11

Google Android

25 vulnerabilities in 2021

#12

SAP 3d Visual Enterprise Viewer

16 vulnerabilities in 2021

#13

Mozilla Firefox

13 vulnerabilities in 2021

#14

Open Xchange Appsuite

12 vulnerabilities in 2021

#15

FasterXML Jackson Databind

12 vulnerabilities in 2021

#16

Jenkins

10 vulnerabilities in 2021

#17

Foxit Software Phantompdf

8 vulnerabilities in 2021

#18

Microsoft Sharepoint Enterprise Server

8 vulnerabilities in 2021

#19

Juniper Networks Junos

8 vulnerabilities in 2021

#20

Foxit Software Reader

8 vulnerabilities in 2021

By Vendor

#1

Microsoft

79 vulnerabilities in 2021

#2

Google

61 vulnerabilities in 2021

#3

Oracle

49 vulnerabilities in 2021

#4

SAP

22 vulnerabilities in 2021

#5

Cisco

18 vulnerabilities in 2021

#6

IBM

17 vulnerabilities in 2021

#7

Mozilla

13 vulnerabilities in 2021

#8

FasterXML

12 vulnerabilities in 2021

#9

Open Xchange

12 vulnerabilities in 2021

#10

Jenkins

12 vulnerabilities in 2021

#11

Dell

10 vulnerabilities in 2021

#12

Juniper Networks

9 vulnerabilities in 2021

#13

Foxit Software

8 vulnerabilities in 2021

#14

Red Hat

7 vulnerabilities in 2021

#15

GNU

6 vulnerabilities in 2021

#16

Debian

5 vulnerabilities in 2021

#17

Uclouvain

5 vulnerabilities in 2021

#18

Combodo

5 vulnerabilities in 2021

#19

GitLab

5 vulnerabilities in 2021

#20

Apache

5 vulnerabilities in 2021

By Weakness

#1
Out-of-bounds Write
The software writes data past the end, or before the beginning, of the intended buffer.
144
 
11.8%
#2
XSS
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
129
 
10.5%
#3
Improper Privilege Management
The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
69
 
5.6%
#4
Improper Input Validation
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
36
 
2.9%
#5
Marshaling, Unmarshaling
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
29
 
2.4%
#6
Dangling pointer
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
24
 
2.0%
#7
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
24
 
2.0%
#8
Directory traversal
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
22
 
1.8%
#9
Information Leak
An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.
20
 
1.6%
#10
AuthZ
The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
19
 
1.6%
#11
Improper Neutralization of Special Elements used in a Command ('Command Injection')
The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
18
 
1.5%
#12
Memory Corruption
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
17
 
1.4%
#13
Out-of-bounds Read
The software reads data past the end, or before the beginning, of the intended buffer.
16
 
1.3%
#14
Uncontrolled Resource Consumption ('Resource Exhaustion')
The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.
14
 
1.1%
#15
Shell injection
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
13
 
1.1%
#16
Cleartext Storage of Sensitive Information
The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
12
 
1.0%
#17
Insufficiently Protected Credentials
This weakness occurs when the application transmits or stores authentication credentials and uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
12
 
1.0%
#18
Downstream Injection
The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
11
 
0.9%
#19
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
10
 
0.8%
#20
AuthZ
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
10
 
0.8%
#21
Unrestricted File Upload
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
8
 
0.7%
#22
Incorrect Permission Assignment for Critical Resource
The software specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
8
 
0.7%
#23
DLL preloading
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
8
 
0.7%
#24
Race Condition
The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
7
 
0.6%
#25
Information Exposure Through an Error Message
The software generates an error message that includes sensitive information about its environment, users, or associated data.
7
 
0.6%

By Category

Content Management

Joomla

3 vulnerabilities in 2021

Database

Oracle MySQL

37 vulnerabilities in 2021

Oracle Database Server

2 vulnerabilities in 2021

Microsoft SQL Server

1 vulnerability in 2021

Desktop Software

Mozilla Thunderbird

6 vulnerabilities in 2021

Microsoft Office

5 vulnerabilities in 2021

Microsoft Excel

2 vulnerabilities in 2021

Development Tools

Jenkins

10 vulnerabilities in 2021

Microsoft Visual Studio

2 vulnerabilities in 2021

DevOps

GitLab

5 vulnerabilities in 2021

Java Application Servers

Oracle Weblogic Server

3 vulnerabilities in 2021

Java Libraries

FasterXML Jackson Databind

12 vulnerabilities in 2021

Operating Systems

Microsoft Windows 10

63 vulnerabilities in 2021

Microsoft Windows Server 2016

59 vulnerabilities in 2021

Microsoft Windows Server 2019

53 vulnerabilities in 2021

Runtime Environments

nodejs node.js

2 vulnerabilities in 2021

Server Software

Microsoft Sharepoint Enterprise Server

8 vulnerabilities in 2021

Microsoft Sharepoint Server

7 vulnerabilities in 2021

Web Application Framework

Microsoft ASP.NET Core

1 vulnerability in 2021

Web Browsers

Google Chrome

36 vulnerabilities in 2021

Mozilla Firefox

13 vulnerabilities in 2021


Report Last Updated: January 24, 2021