CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Google : Vulnerability Statistics

Vulnerability Feeds & Widgets

Vulnerability Trends Over Time

Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
2002 1 1
2003 2 1
2004 1 1
2005 8 2 1 3 1 1
2006 2 1 1
2007 12 1 2 4 1 1 1
2008 5 1 2 2 1
2009 43 19 10 7 3 6 6 2 1
2010 140 77 23 22 25 4 10 13 1 3
2011 270 183 14 25 12 7 26 10 5 1
2012 233 178 16 44 8 8 13 5 5 2
2013 154 103 6 36 11 4 2 12 10 1
2014 131 78 18 29 5 1 7 1 12 7 1 1 1
2015 282 169 58 89 51 4 45 19 19
2016 672 188 75 122 41 7 83 112 236
2017 909 92 209 184 34 11 1 39 121 36
2018 788 35 102 173 14 2 10 3 27 85 4 3 1
2019 829 40 135 67 34 3 5 1 85 54 2
2020 1154 52 104 140 33 9 3 5 185 120 5
2021 1097 69 74 128 43 2 2 5 99 34 7
2022 556 49 36 59 8 2 54 8 3
Total 7289 1337 883 1129 322 17 88 22 698 603 324 7 1 6
% Of All 18.3 12.1 15.5 4.4 0.2 1.2 0.3 0.0 9.6 8.3 4.4 0.1 0.0

Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart. (Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)

Vulnerabilities By Year
1
2
1
8
2
12
5
43
140
270
233
154
131
282
672
909
788
829
1154
1097
556
  2002 1
2003 2
2004 1
2005 8
2006 2
2007 12
2008 5
2009 43
2010 140
2011 270
2012 233
2013 154
2014 131
2015 282
2016 672
2017 909
2018 788
2019 829
2020 1154
2021 1097
2022 556
Vulnerabilities By Type
1337
698
88
883
22
603
1129
322
7
324
17
1
  Denial of Service 1337
Bypass Something 698
XSS 88
Execute Code 883
Directory Traversal 22
Gain Information 603
Overflow 1129
Memory Corruption 322
CSRF 7
Gain Privilege 324
Sql Injection 17
File Inclusion 1

Click on legend names to show/hide lines for vulnerability types
If you can't see MS Office style charts above then it's time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.

This page lists vulnerability statistics for all products of Google. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of this vendor. You can view products of this vendor or security vulnerabilities related to products of Google.

CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.