![]() |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type Distributions in CVEDocument version: 1.0 Date: October 4, 2006 This is a draft report and does not represent an official position of The MITRE Corporation. Copyright © 2006, The MITRE Corporation. All rights reserved. Permission is granted to redistribute this document if this paragraph is not removed. This document is subject to change without notice. Author: Steve Christey
Table of Contents
Introduction
For the past 5 years, CVE has been tracking the types of errors that lead to publicly reported vulnerabilities, and periodically reporting trends on a limited scale. In support of the Common Weakness Enumeration (CWE) project [1], and as a result of the interest in this work as mentioned during the "Year of the web application: Hack & Data from the Front lines" panel at the 5th Annual Cyber Security Executive Summit in New York City on September 13, 2006, we have published a more extensive analysis. An updated version will be released once 2006 is complete. The primary goal of this study is to better understand research trends using publicly reported vulnerabilities. It should be noted that the data is obtained from an uncontrolled population, i.e., decentralized public reports from a research community with diverse goals and interests, with an equally diverse set of vendors and developers. More specialized, exhaustive, and repeatable methods could be devised to evaluate software security. But until such methods reach maturity and widespread acceptance, the overall state of software security can be viewed through the lens of public reports.
Summary of Results
Data Sets
Three main data sets were used in this analysis. OVERALL: this data set consists of all CVEs that were first publicly reported in 2001 or later (earlier CVEs do not have the appropriate fields filled out.) CVE includes all types of software, whether from a major vendor or an individual hobbyist programmer, as long as the associated vulnerability has been reported by the developer or posted by a researcher or third party to sources such as mailing lists and vulnerability databases. CVE only includes distributable software, i.e., it does not include issues that are reported for custom software in specific web sites. While CVE data is incomplete, it is estimated that it is 80% complete relative to all major mailing lists and vulnerability databases, with the likely exception of data from 2003. OS VENDOR: this data set identifies CVEs that are associated with operating system (OS) vendor advisories, which would capture vulnerabilities in the kernel, as well as applications that are supported by the OS vendor. The data was limited to CVEs that have one or more references from the following sources. For open source OS vendors, the following sources were used: DEBIAN, FREEBSD, MANDRAKE/MANDRIVA, NETBSD, OPENBSD, REDHAT, and SUSE. The closed source OS vendors included: AIXAPAR, APPLE, CISCO, HP, MS, MSKB, SCO, SGI, SUN, and SUNALERT. CVE does not have the internal data fields to support more fine-grained analysis for major non-OS vendors. OPEN/CLOSED SOURCE: open and closed source operating system (OS) vendors were using the same methods and categories as described in the "OS VENDOR" section. Because some closed source vendors such as Apple have significant codebase overlap with open source products, any overlapping CVEs were removed from the data set. Both open and closed sets had at least 1700 vulnerabilities. In each data set, vulnerabilities were not removed if they were marked as "disputed." Many disputes are incorrect or unresolved.
Trend Table Color Key
In the HTML pages, the following color key is used for trend tables. GRAY: used in comparisons to help visually separate one data set from another RED: a top 10 for that year GREEN: during that year, the vulnerability's rank was at least 5 points BELOW the average rank for that vulnerability YELLOW: during that year, the vulnerability's rank was at least 5 points ABOVE the average rank for that vulnerability So, green on the left indicates vulns with RISING popularity, as will yellow on the right. Green on the right indicates vulns with FALLING popularity, as will yellow on the left.
Table 1 Analysis: Overall Trends
The most notable trend is the sharp rise in public reports for vulnerabilities that are specific to web applications. Buffer overflows were number 1 year after year, but that changed in 2005 with the rise of web application vulnerabilities, including cross-site scripting (XSS), SQL injection, and remote file inclusion, although SQL injection is not limited just to web applications. In fact, so far in 2006, buffer overflows are only #4. There are probably several contributing factors to this increase in web vulnerabilities:
Overall Trends: Other Interesting Results
Table 2 and 3 Analysis: OS vs. non-OS
Given the increase in web application vulnerabilities and the likelihood that it is partially due to researcher interest in software with small user bases, an analysis was performed based solely on advisories from operating system (OS) vendors. These advisories frequently include the OS kernel and key applications that are supported by the vendor. See the Data Sets section for more information. Unfortunately, more precise data sets could not be generated. Table 2 provides the data for OS vendor advisories alone. Table 3 contrasts the OS vendor advisories with all other reported issues. There are several notable results:
Table 4 Analysis: Open and Closed Source
Table 4 compares the vulnerability type distribution between the open source and closed source operating system (OS) vendors. See the "Data Sets" section for more information on how the data sets were generated. As a reminder, CVEs that overlapped both open and closed source sets were omitted. IMPORTANT : it is inappropriate to use these results to compare the relative security of open and closed source products, so the report excludes raw numbers. Both sets had at least 1700 vulnerabilities. There are too many variations in vendor advisory release policies, possible differences in research techniques, and other factors cited in [2]. And, simply put, there is too much potential for raw numbers to be misused and misinterpreted. However, some results pose interesting questions that merit more in-depth investigation. These discrepancies might reflect differences in vulnerability research techniques, researcher sub-communities, vendor disclosure policies, and development practices and APIs, but this has not been proven. The research and vendor communities are encouraged to investigate the underlying causes for these differences, which could provide lessons learned for all software developers, open and closed source alike. Some of the most notable results are:
Possible Future Work
Notes on Potential Bias
The diversity of both researchers and vendor disclosure practices introduces several unmeasurable biases, as described in more detail in [2]. In the overall results, 2003's issues have 20% with vulnerabilities that are "not specified" by the CVE analyst, which is inconsistent with statistics from other years. Many of these vulnerabilities were reviewed after this discovery, and they are in fact of type "other." This discrepancy has not been sufficiently explained, although it is probably at least partially due to the relative percentage of CVEs in OS vendor advisories to other CVEs, since 2003 was a low-output year for CVE and thus the concentration was in high-priority software. Some vulnerability types are probably under-represented due to classification difficulty. For example, the "form-field" type (web parameter tampering) might occasionally get classified as an authentication error, depending on how the original researcher reports the issue.
(In)Frequently Asked Questions
Credits
Large-scale trend analyses like this are not possible without the body of knowledge that has been formed by hundreds or thousands of researchers, from hobbyists to professionals. Thanks to the following for substantive feedback on the initial draft, sometimes in the form of a question that required more investigation: Bill Heinbockel, Chris Wysopal, and Mark Curphey.
References
Flaw Terminology
auth — Weak/bad authentication problem (CWE: CWE-289, CWE-288, CWE-302, CWE-305, CWE-294, CWE-290, CWE-287, CWE-303) buf — Buffer overflow (CWE: CWE-119, CWE-120) CF — General configuration problem, not perm or default (CWE: none) crlf — CRLF injection (CWE: CWE-93) crypt — Cryptographic error (poor design or implementation), including plaintext storage/transmission of sensitive information. (CWE: CWE-310, CWE-311, CWE-347, CWE-320, CWE-325) CSRF — Cross-Site Request Forgery (CSRF) (CWE: CWE-352) default — Insecure default configuration, e.g., passwords or permissions (CWE: N/A) design — Design problem, generally in protocols or programming languages. Since 2005, its use has been limited due to the highly general nature of this type. (CWE: none) dos-flood — DoS caused by flooding with a large number of *legitimately formatted* requests/etc.; normally DoS is a crash, or spending a lot more time on a task than it "should" (CWE: CWE-400) dos-malform — DoS caused by malformed input (CWE: CWE-238, CWE-234, CWE-166, CWE-230, many others) dos-release — DoS because system does not properly release resources (CWE: CWE-404) dot — Directory traversal (file access via ".." or variants) (CWE: CWE-22, CWE-23, CWE-36) double-free — Double-free vulnerability (CWE: CWE-415) eval-inject — Eval injection (CWE: CWE-95) form-field — CGI program inherently trusts form field that should not be modified (i.e., should be stored locally) (CWE: CWE-472) format-string — Format string vulnerability; user can inject format specifiers during string processing. (CWE: CWE-134) infoleak — Information leak by a product, which is not the result of another vulnerability; typically by design or by producing different "answers" that suggest the state; often related to configuration / permissions or error reporting/handling. (CWE: CWE-205, CWE-212, CWE-203, CWE-209, CWE-207, CWE-200, CWE-215, others) int-overflow — A numeric value can be incremented to the point where it overflows and begins at the minimum value, with security implications. Overlaps signedness errors. (CWE: CWE-190) link — Symbolic link following (CWE: CWE-61, CWE-64) memleak — Memory leak (doesn't free memory when it should); use this instead of dos-release (CWE: CWE-401) metachar — Unescaped shell metacharacters or other unquoted "special" char's; currently includes SQL injection but not XSS. (CWE: CWE-78) msdos-device — Problem due to file names with MS-DOS device names. (CWE: CWE-67) not-specified — The CVE analyst has not assigned a flaw type to the issue, typically similar to "other". (CWE: none) other — Other vulnerability; issue could not be described with an available type at the time of analysis. (CWE: none) pass — Default or hard-coded password (CWE: CWE-259) perm — Assigns bad permissions, improperly calculates permissions, or improperly checks permissions (CWE: CWE-276) php-include — PHP remote file inclusion (CWE: CWE-98) priv — Bad privilege assignment, or privileged process/action is unprotected/unauthenticated. (CWE: CWE-266, CWE-274, CWE-272, CWE-250, CWE-264, CWE-265, CWE-268, CWE-270, CWE-271, CWE-269, CWE-267) race — General race condition (NOT SYMBOLIC LINK FOLLOWING (link)!) (CWE: CWE-362, CWE-366, CWE-364, CWE-367, CWE-421, CWE-368, CWE-363, CWE-370) rand — Generation of insufficiently random numbers, typically by using easily guessable sources of "random" data (CWE: CWE-330, CWE-331, CWE-332, CWE-338, CWE-342, CWE-341, CWE-339, others) relpath — Untrusted search path vulnerability - Relies on search paths to find other executable programs or files, opening up to Trojan horse attacks, e.g., PATH environment variable in Unix. (CWE: CWE-426, CWE-428, CWE-114) sandbox — Java/etc. sandbox escape - NOT BY DOT-DOT! (CWE: CWE-265) signedness — Signedness error; a numeric value in one format/representation is improperly handled when it is used as if it were another format/representation. Overlaps integer overflows and array index errors. (CWE: CWE-195, CWE-196) spoof — Product is vulnerable to spoofing attacks, generally by not properly verifying authenticity. (CWE: CWE-290, CWE-350, CWE-347, CWE-345, CWE-247, CWE-292, CWE-291) sql-inject — SQL injection vulnerability (CWE: CWE-89) type-check — Product incorrectly identifies the type of an input parameter or file, then dispatches the wrong "executable" (possibly itself) to process the input, or otherwise misrepresents the input in a security-critical way. (CWE: unknown) unk — Unknown vulnerability; report is too vague to determine type of issue. (CWE: none) upload — Product does not restrict the extensions for files that can be uploaded to the web server, leading to code execution if executable extensions are used in filenames, such as .asp, .php, and .shtml. (CWE: CWE-434) webroot — Storage of sensitive data under web document root with insufficient access control. (CWE: CWE-219, CWE-433) XSS — Cross-site scripting (aka XSS) (CWE: CWE-79, CWE-80, CWE-87, CWE-85, CWE-82, CWE-81, CWE-83, CWE-84)
Table 1: Overall Results
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2247 | 32 | 187 | 88 | 276 | 725 | 939 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 2] | buf | 13.3% | 19.5% ( 1) | 20.3% ( 1) | 22.5% ( 1) | 15.4% ( 1) | 09.8% ( 3) | 07.9% ( 4) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2156 | 279 | 433 | 264 | 391 | 445 | 344 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 3] | sql-inject | 08.7% | 00.4% (27) | 01.8% (12) | 03.0% ( 4) | 05.5% ( 3) | 12.9% ( 2) | 14.0% ( 2) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1416 | 6 | 38 | 35 | 140 | 584 | 613 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 4] | dot | 04.7% | 08.9% ( 2) | 05.1% ( 3) | 02.9% ( 5) | 04.1% ( 4) | 04.3% ( 4) | 04.4% ( 5) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
764 | 127 | 110 | 34 | 104 | 195 | 194 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 5] | php-include | 03.5% | 00.1% (31) | 00.3% (30) | 00.8% (15) | 01.4% (10) | 02.1% ( 6) | 09.5% ( 3) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
561 | 1 | 6 | 9 | 36 | 95 | 414 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 6] | infoleak | 03.3% | 02.6% ( 9) | 04.2% ( 5) | 02.6% ( 7) | 03.7% ( 5) | 03.9% ( 5) | 02.6% ( 6) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
540 | 37 | 89 | 30 | 95 | 175 | 114 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 7] | dos-malform | 02.9% | 04.8% ( 3) | 05.1% ( 4) | 02.5% ( 8) | 03.4% ( 6) | 01.8% ( 8) | 02.0% ( 7) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
463 | 69 | 110 | 29 | 87 | 82 | 86 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 8] | link | 02.0% | 04.5% ( 4) | 02.1% ( 9) | 03.5% ( 3) | 02.8% ( 7) | 01.9% ( 7) | 00.5% (16) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
329 | 64 | 45 | 41 | 72 | 87 | 20 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[ 9] | format-string | 01.8% | 03.2% ( 7) | 01.8% (11) | 02.7% ( 6) | 02.4% ( 8) | 01.7% ( 9) | 01.0% (10) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
296 | 46 | 39 | 32 | 61 | 76 | 42 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[10] | crypt | 01.6% | 03.8% ( 6) | 02.7% ( 6) | 01.5% ( 9) | 00.9% (16) | 01.5% (10) | 00.9% (11) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
261 | 55 | 58 | 18 | 22 | 68 | 40 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[11] | priv | 01.4% | 02.5% (10) | 02.2% ( 8) | 01.0% (12) | 01.3% (11) | 01.5% (11) | 00.9% (12) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
233 | 36 | 46 | 12 | 32 | 67 | 40 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[12] | metachar | 01.3% | 03.8% ( 5) | 02.6% ( 7) | 00.7% (17) | 01.0% (14) | 01.3% (12) | 00.3% (20) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
218 | 55 | 56 | 8 | 26 | 59 | 14 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[13] | perm | 01.3% | 02.7% ( 8) | 01.8% (10) | 01.3% (11) | 00.9% (15) | 01.1% (13) | 01.1% ( 9) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
215 | 39 | 39 | 15 | 24 | 48 | 50 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[14] | int-overflow | 01.0% | 00.1% (32) | 00.4% (22) | 01.4% (10) | 01.9% ( 9) | 00.8% (15) | 01.2% ( 8) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
160 | 1 | 8 | 16 | 47 | 36 | 52 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[15] | dos-flood | 00.8% | 02.0% (12) | 01.7% (13) | 00.5% (19) | 01.2% (12) | 00.2% (27) | 00.4% (17) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
131 | 29 | 36 | 6 | 31 | 10 | 19 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[16] | pass | 00.8% | 01.1% (18) | 01.3% (14) | 00.2% (28) | 01.1% (13) | 00.8% (14) | 00.4% (18) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
125 | 16 | 27 | 2 | 28 | 36 | 16 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[17] | auth | 00.8% | 01.5% (13) | 01.3% (15) | 00.5% (20) | 00.7% (17) | 00.5% (19) | 00.7% (14) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
124 | 22 | 27 | 6 | 17 | 21 | 31 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[18] | webroot | 00.5% | 00.1% (29) | 00.2% (32) | 00.3% (24) | 00.2% (30) | 00.7% (16) | 00.9% (13) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
88 | 2 | 5 | 3 | 5 | 33 | 40 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[19] | form-field | 00.5% | 00.7% (24) | 00.8% (17) | 00.5% (21) | 00.2% (27) | 00.4% (20) | 00.5% (15) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
81 | 10 | 17 | 6 | 6 | 19 | 23 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[20] | relpath | 00.4% | 00.8% (22) | 00.3% (29) | 00.9% (14) | 00.6% (18) | 00.3% (22) | 00.3% (21) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
71 | 12 | 6 | 10 | 14 | 15 | 14 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[21] | race | 00.4% | 00.5% (26) | 00.4% (24) | 00.6% (18) | 00.4% (21) | 00.6% (17) | 00.3% (24) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
69 | 7 | 8 | 7 | 10 | 26 | 11 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[22] | memleak | 00.4% | 01.1% (17) | 00.2% (31) | 00.4% (22) | 00.5% (19) | 00.3% (23) | 00.2% (27) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
61 | 16 | 5 | 5 | 13 | 15 | 7 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[23] | msdos-device | 00.4% | 01.0% (20) | 00.6% (19) | 00.9% (13) | 00.2% (23) | 00.2% (28) | 00.0% (32) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
57 | 15 | 13 | 11 | 6 | 10 | 2 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[24] | crlf | 00.3% | ... | 00.2% (33) | 00.1% (30) | 00.5% (20) | 00.4% (21) | 00.3% (19) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
49 | 0 | 4 | 1 | 13 | 17 | 14 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[25] | default | 00.3% | 01.1% (16) | 00.7% (18) | 00.1% (33) | 00.2% (26) | 00.1% (33) | 00.1% (29) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
48 | 16 | 16 | 1 | 6 | 3 | 6 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[26] | spoof | 00.3% | 01.0% (19) | 00.3% (28) | 00.1% (32) | 00.1% (33) | 00.2% (26) | 00.3% (25) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
48 | 15 | 7 | 1 | 3 | 11 | 11 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[27] | sandbox | 00.3% | 01.2% (15) | 01.0% (16) | ... | 00.2% (29) | 00.0% (34) | ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
46 | 17 | 22 | 0 | 5 | 2 | 0 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[28] | rand | 00.3% | 01.2% (14) | 00.6% (20) | 00.3% (25) | 00.2% (32) | 00.0% (35) | 00.2% (26) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
45 | 17 | 12 | 3 | 4 | 2 | 7 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[29] | upload | 00.3% | ... | 00.0% (36) | 00.1% (29) | 00.2% (24) | 00.5% (18) | 00.3% (22) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
43 | 0 | 1 | 1 | 6 | 22 | 13 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[30] | signedness | 00.2% | 00.1% (30) | 00.4% (23) | 00.8% (16) | 00.2% (25) | 00.3% (24) | 00.0% (34) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
38 | 1 | 8 | 9 | 6 | 12 | 2 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[31] | dos-release | 00.2% | 00.9% (21) | 00.5% (21) | 00.2% (27) | 00.2% (31) | ... | ... | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
30 | 13 | 10 | 2 | 5 | 0 | 0 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[32] | CF | 00.2% | 00.7% (23) | 00.3% (27) | 00.2% (26) | ... | 00.1% (31) | 00.1% (28) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
29 | 10 | 7 | 2 | 0 | 4 | 6 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[33] | eval-inject | 00.2% | ... | ... | ... | 00.0% (34) | 00.2% (25) | 00.3% (23) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
25 | 0 | 0 | 0 | 1 | 11 | 13 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[34] | design | 00.1% | 00.6% (25) | 00.4% (26) | 00.1% (31) | 00.0% (35) | 00.1% (32) | 00.0% (31) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
23 | 8 | 8 | 1 | 1 | 3 | 2 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[35] | double-free | 00.1% | ... | 00.1% (34) | 00.3% (23) | 00.2% (22) | 00.1% (30) | 00.1% (30) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
21 | 0 | 2 | 4 | 6 | 5 | 4 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[36] | CSRF | 00.1% | ... | 00.0% (35) | ... | 00.2% (28) | 00.2% (29) | 00.0% (33) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
16 | 0 | 1 | 0 | 5 | 8 | 2 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[37] | type-check | 00.1% | 00.4% (28) | 00.4% (25) | ... | ... | 00.0% (36) | 00.0% (35) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
16 | 6 | 8 | 0 | 0 | 1 | 1 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
UNKNOWN/UNSPECIFIED ITEMS | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
n/a | unk | 09.0% | 07.9% | 07.1% | 07.0% | 08.2% | 08.9% | 11.5% | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1460 | 114 | 151 | 82 | 209 | 402 | 502 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
n/a | other | 15.2% | 16.7% | 19.0% | 11.8% | 17.2% | 13.1% | 14.9% | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2468 | 239 | 407 | 139 | 435 | 595 | 653 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
n/a | not-specified | 06.9% | 00.1% | 03.1% | 20.5% | 11.3% | 11.3% | 00.3% | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1121 | 2 | 66 | 240 | 286 | 513 | 14 |
For the 'top N' vulnerabilities in each year, the table identifies the total percentage of overall vulnerabilities. For example, a figure of 45.0 for Top 5 says that the Top 5 accounted for 45% of all reported vulnerabilities in that year.
Top n | TOTAL | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 |
---|---|---|---|---|---|---|---|
5 | 44.1 | 41.5 | 43.4 | 39.4 | 39.6 | 46.9 | 57.3 |
10 | 55.7 | 56.3 | 54.8 | 50.1 | 51.5 | 55.9 | 65.2 |
Rank | Flaw | TOTAL | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 |
---|---|---|---|---|---|---|---|---|
Total | 4418 | 443 | 660 | 527 | 736 | 1199 | 853 | |
[ 1] | buf | 20.0% | 21.0% ( 1) | 26.8% ( 1) | 24.9% ( 1) | 20.4% ( 1) | 16.2% ( 1) | 16.1% ( 1) |
882 | 93 | 177 | 131 | 150 | 194 | 137 | ||
[ 2] | link | 04.0% | 07.4% ( 2) | 03.3% ( 4) | 04.0% ( 2) | 05.2% ( 2) | 04.0% ( 3) | 01.8% ( 5) |
177 | 33 | 22 | 21 | 38 | 48 | 15 | ||
[ 3] | dos-malform | 03.7% | 05.6% ( 3) | 06.1% ( 2) | 02.7% ( 4) | 04.5% ( 4) | 01.8% ( 7) | 03.3% ( 4) |
162 | 25 | 40 | 14 | 33 | 22 | 28 | ||
[ 4] | XSS | 03.4% | 01.6% (12) | 04.4% ( 3) | 03.0% ( 3) | 01.4% ( 7) | 04.2% ( 2) | 04.7% ( 3) |
152 | 7 | 29 | 16 | 10 | 50 | 40 | ||
[ 5] | int-overflow | 02.7% | ... | 01.2% (12) | 02.3% ( 6) | 04.6% ( 3) | 02.1% ( 6) | 04.7% ( 2) |
119 | 0 | 8 | 12 | 34 | 25 | 40 | ||
[ 6] | format-string | 02.4% | 05.2% ( 4) | 01.5% (10) | 02.3% ( 5) | 02.6% ( 5) | 02.4% ( 5) | 01.6% ( 7) |
107 | 23 | 10 | 12 | 19 | 29 | 14 | ||
[ 7] | priv | 02.0% | 04.1% ( 5) | 02.3% ( 6) | 00.8% (13) | 00.8% (14) | 02.6% ( 4) | 01.6% ( 6) |
88 | 18 | 15 | 4 | 6 | 31 | 14 | ||
[ 8] | perm | 01.8% | 04.1% ( 6) | 02.1% ( 7) | 01.1% (11) | 01.1% (10) | 01.7% ( 8) | 01.4% ( 9) |
78 | 18 | 14 | 6 | 8 | 20 | 12 | ||
[ 9] | dot | 01.4% | 01.6% (13) | 01.5% ( 9) | 01.1% ( 8) | 01.6% ( 6) | 01.3% (12) | 01.6% ( 8) |
64 | 7 | 10 | 6 | 12 | 15 | 14 | ||
[10] | metachar | 01.2% | 02.0% ( 9) | 02.6% ( 5) | 00.8% (16) | 00.7% (17) | 01.3% (11) | 00.4% (19) |
53 | 9 | 17 | 4 | 5 | 15 | 3 | ||
[11] | infoleak | 01.2% | 00.9% (20) | 01.2% (13) | 01.1% ( 9) | 01.1% ( 9) | 01.3% (10) | 01.2% (10) |
52 | 4 | 8 | 6 | 8 | 16 | 10 | ||
[12] | race | 01.0% | 01.1% (17) | 00.9% (15) | 00.4% (19) | 01.0% (11) | 01.6% ( 9) | 00.7% (13) |
45 | 5 | 6 | 2 | 7 | 19 | 6 | ||
[13] | memleak | 00.8% | 02.0% (10) | 00.6% (19) | 00.8% (14) | 01.0% (12) | 00.9% (14) | 00.2% (23) |
37 | 9 | 4 | 4 | 7 | 11 | 2 | ||
[14] | sql-inject | 00.8% | 00.2% (27) | 00.6% (21) | 01.1% (10) | 00.7% (16) | 00.9% (13) | 00.9% (11) |
35 | 1 | 4 | 6 | 5 | 11 | 8 | ||
[15] | crypt | 00.8% | 01.6% (14) | 01.4% (11) | 01.1% ( 7) | 00.4% (18) | 00.4% (18) | 00.5% (16) |
34 | 7 | 9 | 6 | 3 | 5 | 4 | ||
[16] | sandbox | 00.7% | 02.7% ( 7) | 02.1% ( 8) | ... | 00.1% (23) | 00.2% (28) | ... |
29 | 12 | 14 | 0 | 1 | 2 | 0 | ||
[17] | relpath | 00.6% | 01.6% (11) | 00.3% (28) | 00.4% (18) | 01.1% ( 8) | 00.3% (27) | 00.7% (14) |
28 | 7 | 2 | 2 | 8 | 3 | 6 | ||
[18] | dos-flood | 00.6% | 02.5% ( 8) | 00.6% (20) | 00.2% (22) | 00.3% (20) | 00.3% (25) | 00.8% (12) |
28 | 11 | 4 | 1 | 2 | 3 | 7 | ||
[19] | auth | 00.5% | 01.4% (15) | 01.1% (14) | 00.6% (17) | 00.3% (21) | 00.3% (21) | 00.2% (24) |
24 | 6 | 7 | 3 | 2 | 4 | 2 | ||
[20] | signedness | 00.5% | 00.2% (24) | 00.9% (16) | 00.9% (12) | 00.4% (19) | 00.6% (15) | 00.2% (25) |
24 | 1 | 6 | 5 | 3 | 7 | 2 | ||
[21] | pass | 00.5% | 00.2% (25) | 00.8% (17) | 00.2% (20) | 00.8% (15) | 00.3% (24) | 00.5% (15) |
21 | 1 | 5 | 1 | 6 | 4 | 4 | ||
[22] | double-free | 00.4% | ... | 00.3% (29) | 00.8% (15) | 00.8% (13) | 00.3% (20) | 00.4% (18) |
19 | 0 | 2 | 4 | 6 | 4 | 3 | ||
[23] | rand | 00.3% | 01.4% (16) | 00.5% (22) | 00.2% (27) | 00.1% (24) | ... | 00.2% (27) |
13 | 6 | 3 | 1 | 1 | 0 | 2 | ||
[24] | crlf | 00.2% | ... | 00.5% (23) | 00.2% (25) | ... | 00.4% (17) | 00.2% (20) |
11 | 0 | 3 | 1 | 0 | 5 | 2 | ||
[25] | spoof | 00.2% | 00.2% (26) | 00.3% (26) | ... | ... | 00.3% (23) | 00.5% (17) |
11 | 1 | 2 | 0 | 0 | 4 | 4 | ||
[26] | form-field | 00.2% | 00.5% (22) | 00.3% (27) | 00.2% (21) | ... | 00.4% (16) | ... |
10 | 2 | 2 | 1 | 0 | 5 | 0 | ||
[27] | default | 00.2% | 00.2% (28) | 00.5% (24) | ... | 00.1% (22) | 00.3% (26) | 00.2% (21) |
10 | 1 | 3 | 0 | 1 | 3 | 2 | ||
[28] | type-check | 00.2% | 00.7% (21) | 00.6% (18) | ... | ... | 00.1% (30) | ... |
8 | 3 | 4 | 0 | 0 | 1 | 0 | ||
[29] | CF | 00.2% | 00.9% (18) | 00.2% (31) | 00.2% (26) | ... | ... | 00.1% (29) |
7 | 4 | 1 | 1 | 0 | 0 | 1 | ||
[30] | dos-release | 00.2% | 00.9% (19) | 00.3% (25) | 00.2% (23) | ... | ... | ... |
7 | 4 | 2 | 1 | 0 | 0 | 0 | ||
[31] | php-include | 00.1% | ... | ... | ... | ... | 00.3% (19) | 00.2% (26) |
6 | 0 | 0 | 0 | 0 | 4 | 2 | ||
[32] | eval-inject | 00.1% | ... | ... | ... | ... | 00.3% (22) | 00.2% (22) |
6 | 0 | 0 | 0 | 0 | 4 | 2 | ||
[33] | design | 00.1% | 00.2% (23) | 00.3% (30) | 00.2% (24) | ... | 00.1% (31) | ... |
5 | 1 | 2 | 1 | 0 | 1 | 0 | ||
[34] | webroot | 00.0% | ... | ... | ... | ... | ... | 00.1% (28) |
1 | 0 | 0 | 0 | 0 | 0 | 1 | ||
[35] | upload | 00.0% | ... | ... | ... | ... | 00.1% (32) | ... |
1 | 0 | 0 | 0 | 0 | 1 | 0 | ||
[36] | CSRF | 00.0% | ... | ... | ... | ... | 00.1% (29) | ... |
1 | 0 | 0 | 0 | 0 | 1 | 0 | ||
UNKNOWN/UNSPECIFIED ITEMS | ||||||||
n/a | unk | 16.0% | 12.4% | 12.6% | 10.4% | 12.2% | 16.1% | 27.2% |
708 | 55 | 83 | 55 | 90 | 193 | 232 | ||
n/a | other | 16.4% | 15.3% | 15.6% | 12.0% | 12.2% | 14.4% | 26.6% |
724 | 68 | 103 | 63 | 90 | 173 | 227 | ||
n/a | not-specified | 14.3% | 00.2% | 05.9% | 26.0% | 24.6% | 22.2% | 00.8% |
631 | 1 | 39 | 137 | 181 | 266 | 7 |
For the 'top N' vulnerabilities in each year, the table identifies the total percentage of overall vulnerabilities. For example, a figure of 45.0 for Top 5 says that the Top 5 accounted for 45% of all reported vulnerabilities in that year.
Top n | TOTAL | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 |
---|---|---|---|---|---|---|---|
5 | 33.8 | 43.3 | 43.2 | 36.9 | 37.3 | 29.4 | 30.6 |
10 | 42.6 | 56.6 | 52.7 | 43.6 | 43.6 | 37.9 | 38 |
Rank | Flaw | TOTAL | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 |
---|---|---|---|---|---|---|---|---|
Total | OS-ven | 4418 | 443 | 660 | 527 | 736 | 1199 | 853 |
Other | 11774 | 991 | 1478 | 646 | 1798 | 3339 | 3522 | |
[ 1] | XSS | 03.4% | 01.6% (13) | 04.4% ( 3) | 03.0% ( 3) | 01.4% ( 7) | 04.2% ( 2) | 04.7% ( 2) |
152 | 7 | 29 | 16 | 10 | 50 | 40 | ||
17.8% | 02.5% ( 8) | 10.7% ( 2) | 11.1% ( 2) | 14.8% ( 1) | 20.2% ( 1) | 25.5% ( 1) | ||
2095 | 25 | 158 | 72 | 266 | 675 | 899 | ||
[ 2] | buf | 20.0% | 21.0% ( 1) | 26.8% ( 1) | 24.9% ( 1) | 20.4% ( 1) | 16.2% ( 1) | 16.1% ( 1) |
882 | 93 | 177 | 131 | 150 | 194 | 137 | ||
10.8% | 18.8% ( 1) | 17.3% ( 1) | 20.6% ( 1) | 13.4% ( 2) | 07.5% ( 3) | 05.9% ( 4) | ||
1274 | 186 | 256 | 133 | 241 | 251 | 207 | ||
[ 3] | sql-inject | 00.8% | 00.2% (27) | 00.6% (19) | 01.1% ( 8) | 00.7% (16) | 00.9% (13) | 00.9% (11) |
35 | 1 | 4 | 6 | 5 | 11 | 8 | ||
11.7% | 00.5% (26) | 02.3% ( 8) | 04.5% ( 3) | 07.5% ( 3) | 17.2% ( 2) | 17.2% ( 2) | ||
1381 | 5 | 34 | 29 | 135 | 573 | 605 | ||
[ 4] | dot | 01.4% | 01.6% (14) | 01.5% ( 9) | 01.1% (10) | 01.6% ( 6) | 01.3% (11) | 01.6% ( 8) |
64 | 7 | 10 | 6 | 12 | 15 | 14 | ||
05.9% | 12.1% ( 2) | 06.8% ( 3) | 04.3% ( 4) | 05.1% ( 4) | 05.4% ( 4) | 05.1% ( 5) | ||
700 | 120 | 100 | 28 | 92 | 180 | 180 | ||
[ 5] | php-include | 00.1% | ... | ... | ... | ... | 00.3% (19) | 00.2% (27) |
6 | 0 | 0 | 0 | 0 | 4 | 2 | ||
04.7% | 00.1% (30) | 00.4% (22) | 01.4% (11) | 02.0% ( 8) | 02.7% ( 6) | 11.7% ( 3) | ||
555 | 1 | 6 | 9 | 36 | 91 | 412 | ||
[ 6] | infoleak | 01.2% | 00.9% (20) | 01.2% (13) | 01.1% (11) | 01.1% ( 9) | 01.3% (10) | 01.2% (10) |
52 | 4 | 8 | 6 | 8 | 16 | 10 | ||
04.1% | 03.3% ( 6) | 05.5% ( 4) | 03.7% ( 5) | 04.8% ( 5) | 04.8% ( 5) | 03.0% ( 6) | ||
488 | 33 | 81 | 24 | 87 | 159 | 104 | ||
[ 7] | dos-malform | 03.7% | 05.6% ( 3) | 06.1% ( 2) | 02.7% ( 4) | 04.5% ( 4) | 01.8% ( 7) | 03.3% ( 4) |
162 | 25 | 40 | 14 | 33 | 22 | 28 | ||
02.6% | 04.4% ( 5) | 04.7% ( 5) | 02.3% ( 8) | 03.0% ( 6) | 01.8% ( 8) | 01.6% ( 7) | ||
301 | 44 | 70 | 15 | 54 | 60 | 58 | ||
[ 8] | link | 04.0% | 07.4% ( 2) | 03.3% ( 4) | 04.0% ( 2) | 05.2% ( 2) | 04.0% ( 3) | 01.8% ( 5) |
177 | 33 | 22 | 21 | 38 | 48 | 15 | ||
01.3% | 03.1% ( 7) | 01.6% (13) | 03.1% ( 7) | 01.9% ( 9) | 01.2% (11) | 00.1% (25) | ||
152 | 31 | 23 | 20 | 34 | 39 | 5 | ||
[ 9] | format-string | 02.4% | 05.2% ( 4) | 01.5% (10) | 02.3% ( 6) | 02.6% ( 5) | 02.4% ( 5) | 01.6% ( 6) |
107 | 23 | 10 | 12 | 19 | 29 | 14 | ||
01.6% | 02.3% ( 9) | 02.0% (11) | 03.1% ( 6) | 02.3% ( 7) | 01.4% ( 9) | 00.8% (12) | ||
189 | 23 | 29 | 20 | 42 | 47 | 28 | ||
[10] | crypt | 00.8% | 01.6% (12) | 01.4% (11) | 01.1% ( 9) | 00.4% (19) | 00.4% (16) | 00.5% (15) |
34 | 7 | 9 | 6 | 3 | 5 | 4 | ||
01.9% | 04.8% ( 3) | 03.3% ( 6) | 01.9% ( 9) | 01.1% (14) | 01.9% ( 7) | 01.0% (10) | ||
227 | 48 | 49 | 12 | 19 | 63 | 36 | ||
[11] | priv | 02.0% | 04.1% ( 5) | 02.3% ( 6) | 00.8% (16) | 00.8% (13) | 02.6% ( 4) | 01.6% ( 7) |
88 | 18 | 15 | 4 | 6 | 31 | 14 | ||
01.2% | 01.8% (12) | 02.1% (10) | 01.2% (14) | 01.4% (11) | 01.1% (12) | 00.7% (13) | ||
145 | 18 | 31 | 8 | 26 | 36 | 26 | ||
[12] | metachar | 01.2% | 02.0% (10) | 02.6% ( 5) | 00.8% (15) | 00.7% (17) | 01.3% (12) | 00.4% (19) |
53 | 9 | 17 | 4 | 5 | 15 | 3 | ||
01.4% | 04.6% ( 4) | 02.6% ( 7) | 00.6% (20) | 01.2% (13) | 01.3% (10) | 00.3% (21) | ||
165 | 46 | 39 | 4 | 21 | 44 | 11 | ||
[13] | perm | 01.8% | 04.1% ( 6) | 02.1% ( 7) | 01.1% ( 7) | 01.1% (10) | 01.7% ( 8) | 01.4% ( 9) |
78 | 18 | 14 | 6 | 8 | 20 | 12 | ||
01.2% | 02.1% (10) | 01.7% (12) | 01.4% (12) | 00.9% (15) | 00.8% (15) | 01.1% ( 9) | ||
137 | 21 | 25 | 9 | 16 | 28 | 38 | ||
[14] | int-overflow | 02.7% | ... | 01.2% (12) | 02.3% ( 5) | 04.6% ( 3) | 02.1% ( 6) | 04.7% ( 3) |
119 | 0 | 8 | 12 | 34 | 25 | 40 | ||
00.3% | 00.1% (31) | ... | 00.6% (18) | 00.7% (17) | 00.3% (21) | 00.3% (17) | ||
41 | 1 | 0 | 4 | 13 | 11 | 12 | ||
[15] | dos-flood | 00.6% | 02.5% ( 8) | 00.6% (18) | 00.2% (27) | 00.3% (21) | 00.3% (26) | 00.8% (12) |
28 | 11 | 4 | 1 | 2 | 3 | 7 | ||
00.9% | 01.8% (11) | 02.2% ( 9) | 00.8% (17) | 01.6% (10) | 00.2% (23) | 00.3% (18) | ||
103 | 18 | 32 | 5 | 29 | 7 | 12 | ||
[16] | pass | 00.5% | 00.2% (25) | 00.8% (17) | 00.2% (26) | 00.8% (15) | 00.3% (20) | 00.5% (17) |
21 | 1 | 5 | 1 | 6 | 4 | 4 | ||
00.9% | 01.5% (16) | 01.5% (14) | 00.2% (27) | 01.2% (12) | 01.0% (14) | 00.3% (16) | ||
104 | 15 | 22 | 1 | 22 | 32 | 12 | ||
[17] | auth | 00.5% | 01.4% (15) | 01.1% (14) | 00.6% (17) | 00.3% (20) | 00.3% (23) | 00.2% (23) |
24 | 6 | 7 | 3 | 2 | 4 | 2 | ||
00.8% | 01.6% (13) | 01.4% (15) | 00.5% (22) | 00.8% (16) | 00.5% (17) | 00.8% (11) | ||
100 | 16 | 20 | 3 | 15 | 17 | 29 | ||
[18] | webroot | 00.0% | ... | ... | ... | ... | ... | 00.1% (28) |
1 | 0 | 0 | 0 | 0 | 0 | 1 | ||
00.7% | 00.2% (28) | 00.3% (26) | 00.5% (21) | 00.3% (26) | 01.0% (13) | 01.1% ( 8) | ||
87 | 2 | 5 | 3 | 5 | 33 | 39 | ||
[19] | form-field | 00.2% | 00.5% (22) | 00.3% (26) | 00.2% (21) | ... | 00.4% (18) | ... |
10 | 2 | 2 | 1 | 0 | 5 | 0 | ||
00.6% | 00.8% (20) | 01.0% (16) | 00.8% (15) | 00.3% (23) | 00.4% (18) | 00.7% (14) | ||
71 | 8 | 15 | 5 | 6 | 14 | 23 | ||
[20] | relpath | 00.6% | 01.6% (11) | 00.3% (25) | 00.4% (19) | 01.1% ( 8) | 00.3% (27) | 00.7% (13) |
28 | 7 | 2 | 2 | 8 | 3 | 6 | ||
00.4% | 00.5% (25) | 00.3% (27) | 01.2% (13) | 00.3% (22) | 00.4% (19) | 00.2% (22) | ||
43 | 5 | 4 | 8 | 6 | 12 | 8 | ||
[21] | race | 01.0% | 01.1% (17) | 00.9% (16) | 00.4% (18) | 01.0% (12) | 01.6% ( 9) | 00.7% (14) |
45 | 5 | 6 | 2 | 7 | 19 | 6 | ||
00.2% | 00.2% (29) | 00.1% (29) | 00.8% (16) | 00.2% (30) | 00.2% (27) | 00.1% (24) | ||
24 | 2 | 2 | 5 | 3 | 7 | 5 | ||
[22] | memleak | 00.8% | 02.0% ( 9) | 00.6% (20) | 00.8% (13) | 01.0% (11) | 00.9% (14) | 00.2% (25) |
37 | 9 | 4 | 4 | 7 | 11 | 2 | ||
00.2% | 00.7% (22) | 00.1% (33) | 00.2% (29) | 00.3% (19) | 00.1% (30) | 00.1% (26) | ||
24 | 7 | 1 | 1 | 6 | 4 | 5 | ||
[23] | msdos-device | 00.0% | ... | ... | ... | ... | ... | ... |
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
00.5% | 01.5% (15) | 00.9% (17) | 01.7% (10) | 00.3% (21) | 00.3% (22) | 00.1% (31) | ||
57 | 15 | 13 | 11 | 6 | 10 | 2 | ||
[24] | crlf | 00.2% | ... | 00.5% (23) | 00.2% (25) | ... | 00.4% (17) | 00.2% (24) |
11 | 0 | 3 | 1 | 0 | 5 | 2 | ||
00.3% | ... | 00.1% (34) | ... | 00.7% (18) | 00.4% (20) | 00.3% (19) | ||
38 | 0 | 1 | 0 | 13 | 12 | 12 | ||
[25] | spoof | 00.2% | 00.2% (28) | 00.3% (29) | ... | ... | 00.3% (21) | 00.5% (16) |
11 | 1 | 2 | 0 | 0 | 4 | 4 | ||
00.3% | 01.4% (17) | 00.3% (25) | 00.2% (28) | 00.2% (29) | 00.2% (25) | 00.2% (23) | ||
37 | 14 | 5 | 1 | 3 | 7 | 7 | ||
[26] | default | 00.2% | 00.2% (26) | 00.5% (24) | ... | 00.1% (22) | 00.3% (25) | 00.2% (26) |
10 | 1 | 3 | 0 | 1 | 3 | 2 | ||
00.3% | 01.5% (14) | 00.9% (18) | 00.2% (26) | 00.3% (27) | ... | 00.1% (29) | ||
38 | 15 | 13 | 1 | 5 | 0 | 4 | ||
[27] | sandbox | 00.7% | 02.7% ( 7) | 02.1% ( 8) | ... | 00.1% (24) | 00.2% (28) | ... |
29 | 12 | 14 | 0 | 1 | 2 | 0 | ||
00.1% | 00.5% (24) | 00.5% (20) | ... | 00.2% (28) | ... | ... | ||
17 | 5 | 8 | 0 | 4 | 0 | 0 | ||
[28] | rand | 00.3% | 01.4% (16) | 00.5% (22) | 00.2% (23) | 00.1% (23) | ... | 00.2% (22) |
13 | 6 | 3 | 1 | 1 | 0 | 2 | ||
00.3% | 01.1% (18) | 00.6% (19) | 00.3% (23) | 00.2% (32) | 00.1% (32) | 00.1% (28) | ||
32 | 11 | 9 | 2 | 3 | 2 | 5 | ||
[29] | upload | 00.0% | ... | ... | ... | ... | 00.1% (32) | ... |
1 | 0 | 0 | 0 | 0 | 1 | 0 | ||
00.4% | ... | 00.1% (32) | 00.2% (30) | 00.3% (20) | 00.6% (16) | 00.4% (15) | ||
42 | 0 | 1 | 1 | 6 | 21 | 13 | ||
[30] | signedness | 00.5% | 00.2% (24) | 00.9% (15) | 00.9% (12) | 00.4% (18) | 00.6% (15) | 00.2% (20) |
24 | 1 | 6 | 5 | 3 | 7 | 2 | ||
00.1% | ... | 00.1% (30) | 00.6% (19) | 00.2% (31) | 00.1% (28) | ... | ||
14 | 0 | 2 | 4 | 3 | 5 | 0 | ||
[31] | dos-release | 00.2% | 00.9% (19) | 00.3% (30) | 00.2% (20) | ... | ... | ... |
7 | 4 | 2 | 1 | 0 | 0 | 0 | ||
00.2% | 00.9% (19) | 00.5% (21) | 00.2% (25) | 00.3% (25) | ... | ... | ||
23 | 9 | 8 | 1 | 5 | 0 | 0 | ||
[32] | CF | 00.2% | 00.9% (18) | 00.2% (31) | 00.2% (24) | ... | ... | 00.1% (29) |
7 | 4 | 1 | 1 | 0 | 0 | 1 | ||
00.2% | 00.6% (23) | 00.4% (23) | 00.2% (24) | ... | 00.1% (29) | 00.1% (27) | ||
22 | 6 | 6 | 1 | 0 | 4 | 5 | ||
[33] | eval-inject | 00.1% | ... | ... | ... | ... | 00.3% (22) | 00.2% (21) |
6 | 0 | 0 | 0 | 0 | 4 | 2 | ||
00.2% | ... | ... | ... | 00.1% (34) | 00.2% (26) | 00.3% (20) | ||
19 | 0 | 0 | 0 | 1 | 7 | 11 | ||
[34] | design | 00.1% | 00.2% (23) | 00.3% (27) | 00.2% (22) | ... | 00.1% (30) | ... |
5 | 1 | 2 | 1 | 0 | 1 | 0 | ||
00.2% | 00.7% (21) | 00.4% (24) | ... | 00.1% (33) | 00.1% (31) | 00.1% (32) | ||
18 | 7 | 6 | 0 | 1 | 2 | 2 | ||
[35] | double-free | 00.4% | ... | 00.3% (28) | 00.8% (14) | 00.8% (14) | 00.3% (24) | 00.4% (18) |
19 | 0 | 2 | 4 | 6 | 4 | 3 | ||
00.0% | ... | ... | ... | ... | 00.0% (33) | 00.0% (33) | ||
2 | 0 | 0 | 0 | 0 | 1 | 1 | ||
[36] | type-check | 00.2% | 00.7% (21) | 00.6% (21) | ... | ... | 00.1% (31) | ... |
8 | 3 | 4 | 0 | 0 | 1 | 0 | ||
00.1% | 00.3% (27) | 00.3% (28) | ... | ... | ... | 00.0% (34) | ||
8 | 3 | 4 | 0 | 0 | 0 | 1 | ||
[37] | CSRF | 00.0% | ... | ... | ... | ... | 00.1% (29) | ... |
1 | 0 | 0 | 0 | 0 | 1 | 0 | ||
00.1% | ... | 00.1% (31) | ... | 00.3% (24) | 00.2% (24) | 00.1% (30) | ||
15 | 0 | 1 | 0 | 5 | 7 | 2 | ||
UNKNOWN/UNSPECIFIED ITEMS | ||||||||
n/a | unk | 16.0% | 12.4% | 12.6% | 10.4% | 12.2% | 16.1% | 27.2% |
708 | 55 | 83 | 55 | 90 | 193 | 232 | ||
06.4% | 06.0% | 04.6% | 04.2% | 06.6% | 06.3% | 07.7% | ||
752 | 59 | 68 | 27 | 119 | 209 | 270 | ||
n/a | other | 16.4% | 15.3% | 15.6% | 12.0% | 12.2% | 14.4% | 26.6% |
724 | 68 | 103 | 63 | 90 | 173 | 227 | ||
14.8% | 17.3% | 20.6% | 11.8% | 19.2% | 12.6% | 12.1% | ||
1744 | 171 | 304 | 76 | 345 | 422 | 426 | ||
n/a | not-specified | 14.3% | 00.2% | 05.9% | 26.0% | 24.6% | 22.2% | 00.8% |
631 | 1 | 39 | 137 | 181 | 266 | 7 | ||
04.2% | 00.1% | 01.8% | 15.9% | 05.8% | 07.4% | 00.2% | ||
490 | 1 | 27 | 103 | 105 | 247 | 7 |
For the 'top N' vulnerabilities in each year, the table identifies the total percentage of overall vulnerabilities. For example, a figure of 45.0 for Top 5 says that the Top 5 accounted for 45% of all reported vulnerabilities in that year.
Top n | TOTAL | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 |
---|---|---|---|---|---|---|---|
5 | 33.8 | 43.3 | 43.2 | 36.9 | 37.3 | 29.4 | 30.6 |
50.9 | 44.7 | 45 | 44.2 | 45.6 | 55.1 | 65.4 | |
10 | 42.6 | 56.6 | 52.7 | 43.6 | 43.6 | 37.9 | 38 |
62.5 | 58 | 57.5 | 56.3 | 56.4 | 64.2 | 73.2 |
Rank | Flaw | TOTAL | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | |
---|---|---|---|---|---|---|---|---|---|
Total | Open | raw numbers omitted | |||||||
Closed | raw numbers omitted | ||||||||
[ 1] | buf | 19.7% | 20.3% ( 1) | 24.6% ( 1) | 25.0% ( 1) | 24.5% ( 1) | 14.6% ( 1) | 17.1% ( 1) | |
20.4% | 20.3% ( 1) | 27.7% ( 1) | 26.1% ( 1) | 15.3% ( 1) | 18.5% ( 1) | 16.3% ( 1) | |||
[ 2] | link | 06.4% | 14.0% ( 2) | 04.8% ( 3) | 04.9% ( 2) | 08.6% ( 2) | 06.1% ( 2) | 02.4% ( 5) | |
01.6% | 01.0% (17) | 01.8% ( 9) | 03.0% ( 2) | 01.9% ( 5) | 00.8% ( 7) | 01.6% ( 6) | |||
[ 3] | dos-malform | 02.8% | 02.7% ( 7) | 04.4% ( 4) | 02.6% ( 6) | 03.5% ( 5) | 01.7% ( 8) | 03.3% ( 4) | |
05.3% | 09.2% ( 2) | 08.1% ( 2) | 02.5% ( 3) | 07.3% ( 2) | 02.1% ( 3) | 03.9% ( 3) | |||
[ 4] | XSS | 04.6% | 02.7% ( 8) | 05.9% ( 2) | 03.0% ( 5) | 01.4% (10) | 05.5% ( 3) | 07.1% ( 2) | |
02.3% | 00.5% (22) | 03.6% ( 4) | 02.5% ( 4) | 00.8% ( 8) | 02.1% ( 4) | 03.2% ( 4) | |||
[ 5] | format-string | 04.0% | 08.6% ( 3) | 02.9% ( 6) | 03.0% ( 4) | 04.9% ( 3) | 03.7% ( 4) | 02.4% ( 6) | |
00.8% | 01.4% (13) | 00.6% (17) | 02.0% ( 5) | 00.4% (18) | 00.8% (10) | 00.3% (17) | |||
[ 6] | int-overflow | 02.6% | ... | 02.2% ( 7) | 03.4% ( 3) | 04.0% ( 4) | 02.2% ( 7) | 03.5% ( 3) | |
01.7% | ... | ... | 01.0% ( 7) | 03.4% ( 3) | 00.8% ( 8) | 04.2% ( 2) | |||
[ 7] | priv | 02.3% | 05.4% ( 4) | 01.8% ( 8) | 01.5% (12) | 01.2% (11) | 02.3% ( 5) | 02.2% ( 7) | |
01.8% | 01.9% ( 8) | 03.0% ( 6) | ... | 00.4% (16) | 03.4% ( 2) | 00.8% (13) | |||
[ 8] | perm | 02.2% | 05.4% ( 5) | 01.1% (13) | 01.9% ( 8) | 01.7% ( 7) | 02.3% ( 6) | 01.4% ( 9) | |
01.6% | 02.4% ( 6) | 03.3% ( 5) | 00.5% (11) | 00.4% (12) | 00.8% (12) | 01.8% ( 5) | |||
[ 9] | dot | 01.5% | 00.5% (18) | 01.8% ( 9) | 01.1% (15) | 02.0% ( 6) | 01.4% (12) | 01.6% ( 8) | |
01.2% | 01.9% (10) | 00.9% (13) | 01.0% ( 9) | 01.5% ( 7) | 00.5% (18) | 01.6% ( 7) | |||
[10] | infoleak | 01.1% | 00.5% (19) | 01.5% (12) | 01.1% (13) | 01.2% (12) | 01.0% (14) | 01.4% (10) | |
01.1% | 01.4% (12) | 00.9% (12) | 01.0% ( 8) | 00.4% (17) | 01.6% ( 5) | 01.1% (10) | |||
[11] | metachar | 01.5% | 03.2% ( 6) | 02.9% ( 5) | 01.5% (11) | 00.6% (15) | 01.4% (11) | 00.5% (15) | |
00.5% | 01.0% (18) | 01.2% (11) | ... | 00.4% (14) | 00.5% (15) | ... | |||
[12] | race | 01.4% | 02.3% ( 9) | 01.8% (10) | 00.4% (19) | 01.7% ( 8) | 01.6% ( 9) | 00.8% (13) | |
00.3% | ... | ... | 00.5% (10) | ... | 00.8% (14) | 00.3% (21) | |||
[13] | sql-inject | 01.2% | 00.5% (21) | 00.7% (18) | 01.9% ( 9) | 00.9% (13) | 01.6% (10) | 01.4% (11) | |
00.4% | ... | 00.6% (18) | 00.5% (20) | 00.4% (13) | ... | 00.8% (14) | |||
[14] | memleak | 00.9% | ... | 00.7% (16) | 01.1% (14) | 01.4% ( 9) | 01.2% (13) | 00.3% (24) | |
00.9% | 04.3% ( 4) | 00.3% (19) | 00.5% (12) | ... | 00.8% (13) | 00.3% (19) | |||
[15] | crypt | 00.7% | 01.8% (11) | 00.7% (15) | 01.9% ( 7) | ... | 00.4% (18) | 00.3% (21) | |
00.9% | 01.0% (16) | 02.1% ( 7) | ... | 00.8% (11) | 00.5% (16) | 00.5% (15) | |||
[16] | sandbox | 00.2% | 00.5% (15) | ... | ... | 00.3% (20) | 00.3% (23) | ... | |
01.4% | 05.3% ( 3) | 04.2% ( 3) | ... | ... | ... | ... | |||
[17] | dos-flood | 00.3% | 01.4% (12) | 00.4% (24) | ... | ... | 00.3% (24) | ... | |
01.1% | 03.9% ( 5) | 00.9% (14) | 00.5% (14) | 00.8% ( 9) | 00.3% (19) | 01.3% ( 8) | |||
[18] | relpath | 00.6% | 01.8% (10) | 00.7% (17) | 00.4% (18) | 00.3% (16) | 00.4% (19) | 00.5% (18) | |
00.7% | 01.4% (14) | ... | 00.5% (13) | 01.9% ( 6) | ... | 01.1% (12) | |||
[19] | auth | 00.1% | 00.5% (16) | ... | ... | 00.3% (17) | ... | 00.3% (20) | |
01.2% | 02.4% ( 7) | 02.1% ( 8) | 01.5% ( 6) | 00.4% (15) | 01.0% ( 6) | 00.3% (18) | |||
[20] | pass | 00.0% | ... | ... | ... | ... | 00.1% (28) | ... | |
01.1% | 00.5% (20) | 01.5% (10) | 00.5% (16) | 02.3% ( 4) | 00.8% (11) | 01.1% ( 9) | |||
[21] | signedness | 00.8% | 00.5% (17) | 01.8% (11) | 01.5% (10) | 00.3% (19) | 00.6% (17) | 00.5% (16) | |
00.2% | ... | ... | 00.5% (17) | ... | 00.5% (17) | ... | |||
[22] | double-free | 00.6% | ... | 00.4% (22) | 01.1% (16) | 00.9% (14) | 00.3% (25) | 00.8% (12) | |
00.2% | ... | ... | 00.5% (19) | 00.8% (10) | 00.3% (21) | ... | |||
[23] | spoof | 00.2% | ... | 00.7% (20) | ... | ... | 00.4% (21) | ... | |
00.3% | 00.5% (23) | ... | ... | ... | 00.3% (20) | 01.1% (11) | |||
[24] | form-field | 00.4% | 00.5% (20) | 00.7% (19) | 00.4% (20) | ... | 00.7% (16) | ... | |
00.1% | 00.5% (21) | ... | ... | ... | ... | ... | |||
[25] | crlf | 00.5% | ... | 01.1% (14) | ... | ... | 00.7% (15) | 00.5% (17) | |
00.0% | ... | ... | ... | ... | ... | ... | |||
[26] | rand | 00.2% | 00.9% (13) | 00.4% (21) | 00.4% (17) | ... | ... | 00.3% (22) | |
00.3% | 01.9% ( 9) | 00.3% (22) | ... | ... | ... | ... | |||
[27] | default | 00.1% | ... | ... | ... | 00.3% (18) | ... | 00.3% (23) | |
00.4% | 00.5% (24) | 00.6% (16) | ... | ... | 00.8% ( 9) | 00.3% (16) | |||
[28] | dos-release | 00.1% | 00.5% (22) | 00.4% (23) | 00.4% (21) | ... | ... | ... | |
00.2% | 01.4% (11) | 00.3% (21) | ... | ... | ... | ... | |||
[29] | type-check | 00.0% | ... | ... | ... | ... | 00.1% (26) | ... | |
00.3% | 01.4% (15) | 00.9% (15) | ... | ... | ... | ... | |||
[30] | CF | 00.1% | 00.9% (14) | ... | ... | ... | ... | ... | |
00.2% | 01.0% (19) | ... | 00.5% (18) | ... | ... | 00.3% (22) | |||
[31] | eval-inject | 00.2% | ... | ... | ... | ... | 00.4% (20) | 00.5% (14) | |
00.0% | ... | ... | ... | ... | ... | ... | |||
[32] | php-include | 00.2% | ... | ... | ... | ... | 00.4% (22) | 00.3% (19) | |
00.0% | ... | ... | ... | ... | ... | ... | |||
[33] | design | 00.0% | ... | ... | ... | ... | ... | ... | |
00.2% | 00.5% (25) | 00.3% (20) | 00.5% (15) | ... | 00.3% (22) | ... | |||
[34] | webroot | 00.0% | ... | ... | ... | ... | ... | ... | |
00.1% | ... | ... | ... | ... | ... | 00.3% (20) | |||
[35] | upload | 00.0% | ... | ... | ... | ... | 00.1% (29) | ... | |
00.0% | ... | ... | ... | ... | ... | ... | |||
[36] | CSRF | 00.0% | ... | ... | ... | ... | 00.1% (27) | ... | |
00.0% | ... | ... | ... | ... | ... | ... | |||
UNKNOWN/UNSPECIFIED ITEMS | |||||||||
n/a | unk | 09.7% | 12.2% | 10.3% | 04.5% | 07.8% | 11.5% | 10.1% | |
25.7% | 13.0% | 15.7% | 20.1% | 23.0% | 26.9% | 45.0% | |||
n/a | other | 19.3% | 13.1% | 20.6% | 15.7% | 10.4% | 15.9% | 39.4% | |
12.4% | 18.8% | 12.7% | 05.0% | 14.9% | 10.7% | 12.4% | |||
n/a | not-specified | 13.4% | 00.0% | 04.4% | 21.6% | 21.9% | 20.5% | 00.8% | |
13.2% | 00.5% | 06.3% | 28.6% | 22.6% | 24.3% | 00.5% |
For the 'top N' vulnerabilities in each year, the table identifies the total percentage of overall vulnerabilities. For example, a figure of 45.0 for Top 5 says that the Top 5 accounted for 45% of all reported vulnerabilities in that year.
Top n | TOTAL | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 |
---|---|---|---|---|---|---|---|
5 | 37.5 | 53.7 | 42.6 | 39.3 | 45.5 | 32.2 | 33.4 |
31.5 | 43 | 46.9 | 36.1 | 30.2 | 27.7 | 29.4 | |
10 | 47.6 | 66.4 | 53.1 | 49.1 | 53.7 | 41.6 | 42.4 |
38.5 | 53.5 | 57.4 | 41.1 | 36 | 31.9 | 36.1 |
Page Last Updated: December 06, 2006
![]() |
Privacy
policy
Terms of use Contact us |