Operating systems are only responsible for 13% of vulnerabilities and hardware devices for 4%. Third-party applications are the most important source of vulnerabilities with over 80% of the reported vulnerabilities in third-party applications. The percentage is lower than in 2013, but the actual number of high security vulnerabilities has increased compared to last year. The number is significantly higher than in 2013 and continues the ascending trend over the past few years.Ģ4% of these vulnerabilities are rated as high severity. This means an average of 19 new vulnerabilities per day. To maintain an IT infrastructure secure, sysadmins need to continually monitor these operating systems and applications for the latest updates and ensure they are always fully patched.ħ,038 new security vulnerabilities were added to the NVD database in 2014. – Which operating systems and applications are listed with most vulnerabilities? This data is important because the products which are on top get the most frequent security updates. – In which areas do we see the most vulnerabilities? Are operating systems, third-party applications or network devices such as routers, switches, access points or printers most at risk? high security impact – like allowing remote code execution – and thus easy to exploit) – What percentage of these vulnerabilities are rated as critical? (e.g.
– What are the latest vulnerability trends? Are we seeing an increase or a decrease in the number of vulnerabilities? In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.
Shellshock live thinking with portals software#
The NVD provides a comprehensive list of software security vulnerabilities. Looking for the 2015 version of this data? Click hereĪn average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD).