Soft Vuln Rep 24
Soft Vuln Rep 24
June 2024
Contents
Introduction 3
Executive Summary 4
Methodology 7
Office Apps 19
Document Viewers 23
Password Managers 25
Antiviruses 27
Image Editors 29
Web Browsers 31
VPN Clients 33
Load Balancers 35
Databases 37
Recommendations 39
Appendix 40
Software Vulnerability
Software Ratings
Vulnerability Report
Ratings 2024
Report 2024 22
Introduction
This report analyzes the security landscape of Armed with this report, CISOs and CIOs gain
enterprise software. Its primary objective is to strategic insights into their software ecosystem.
identify vulnerability trends within commonly used They can make informed decisions about risk
enterprise software categories, with a particular management, resource allocation, and technology
focus on exploitation rate and remote code investments.
execution (RCE) vulnerabilities.
Moreover, CISOs and CIOs can use the report to
Exploitation rate is the metric developed by the evaluate software vendors based on their security
Action1 research team aimed at helping enterprises track record. This informs procurement decisions
assess the risks associated with certain vendors’ and strengthens partnerships with security-
software and the comprehensiveness of the their conscious vendors.
vulnerability management programs.
Finally, the report can help organizations be more
RCE is a dangerous type of vulnerability as it allows proactive in risk mitigation as it enables them to
attackers to execute arbitrary code remotely, focus on critical vulnerabilities, reducing the attack
potentially compromising critical systems. When surface and enhancing overall security posture.
an application has an increased count of RCE
vulnerabilities, it suggests that there are more
potential entry points for attackers to exploit the
organization’s IT environment.
Software Vulnerability
Software Ratings
Vulnerability Report
Ratings 2024
Report 2024 33
Executive Summary
The report provides essential insight into the evolving vulnerability landscape for enterprise software. In light of the
current crisis at the National Vulnerability Database (NVD), where new vulnerability uploads have been suspended
since May 9, 2024*, this information is invaluable to cybersecurity professionals because it shows the trends for
vulnerabilities in popular software, which can help prioritize software for vulnerability monitoring using alternative
tools and approaches while the traditional reliance on NVDs is challenged and allocate resources accordingly.
The report highlights a troubling increase in the total number of vulnerabilities across all categories of enterprise
software, particularly in the number of exploited vulnerabilities, which increased by 22% in 2023.
The key trends, based on exploitability rates and the dynamics of RCE vulnerabilities within enterprise software
categories as well as specific applications, are outlined below.
TREND 1 TREND 2
Load Balancers Are Becoming an Attractive Apple Operating Systems Are Increasingly
Target with a Record Exploitation Rate. Under Attackers’ Radar.
The trend that catches the eye first is the astonishingly Apple operating systems, MacOS and iOS, showed
high exploitation rate for NGINX (100%) and Citrix an increased exploitation rate in 2023, 7% and
(57%). Vulnerabilities in load balancers pose 8% respectively, suggesting that attackers are
significant risks, as a single exploit in these systems increasingly exploiting these OS.
can provide broad access or disruption capabilities
against targeted networks. While the total number of Even though MacOS reduced its total vulnerability
vulnerabilities reported for load balancers over the number by 29%, it reported 30% more exploited
three-year period analyzed accounts for only 0.2% vulnerabilities in 2023 than in 2022, totaling 18.
of the total number of vulnerabilities analyzed, the While Windows desktop operating systems have the
impact of these severe vulnerabilities, as exemplified highest number of vulnerabilities, including critical
by the infamous CitrixBleed, demonstrates that high and RCE, their exploitation rates remain stable at 4%,
exploitation rates of vulnerabilities can be more which shows that Microsoft has a stable vulnerability
significant indicators than their number. management process with low fluctuation.
For organizations, this means they need to pay close MS Windows Server 2016 is the absolute leader
attention to ensuring regular updates for the Citrix in terms of the total number of vulnerabilities. It
load balancer or look for alternatives, considering also reported a record 177 RCEs in 2023. Although
the company’s needs. Linux reported fewer RCE vulnerabilities in 2023
compared to other operating systems analyzed,
Software Vulnerability
Software Ratings
Vulnerability Report
Ratings 2024
Report 2024 44
totaling 13, their 63% surge is concerning, especially The growth in critical RCEs calls for
as it continues a 60% increase from 8 RCEs in 2022. immediate attention from OS vendors,
The growth in dangerous RCEs underscores the researchers, and organizations.
need for both Windows and Linux researchers to
prioritize the discovery and mitigation of this type
of vulnerability. For organizations, this highlights
the need for proper patching. Nevertheless, our
research shows that Linux is the least vulnerable
OS to hacker attacks due to the small number
of exploited vulnerabilities, which is decreasing TREND 3
further.
MSSQL RCE Vulnerabilities Surge 1600%,
In the segment of mobile operating systems, there Highlighting Increased Risk of New
is an even greater disparity between the total Exploits.
number of vulnerabilities and their exploitation
between Google and Apple OS. Specifically, Android In 2023, Microsoft SQL Server (MSSQL)
reported an absolute record of 1421 vulnerabilities experienced an astonishing 1600% surge in
in 2023, with only 3 exploited, resulting in a low critical vulnerabilities, totaling 17, all of which are
exploitation rate of 0.2%. In contrast, while iOS RCEs, raising immediate concerns for database
reported 268 vulnerabilities last year, a significant administrators and cybersecurity teams. This spike,
20 of them were exploited, resulting in a significant contrasting with previous years, signals a potential
exploitation rate of 8%. It’s notable that iOS is risk that attackers might one day be faster than
also the leader in RCE counts over the three years researchers in discovering and exploiting the next
analyzed. These findings underscore the targeted unknown RCE. The current increase in known RCEs
nature of attacks on iOS devices, possibly due to suggests to attackers that there might be other
the perception of the valuable data they store. undiscovered RCE vulnerabilities in this system.
The increase in exploited vulnerabilities for MSSQL is a lucrative target for hackers due to
MacOS and iOS is a concerning trend for Apple. its widespread use in enterprise environments,
For some reason, the company is not managing housing valuable data like customer information
to fix vulnerabilities before attackers exploit and financial records. Its remote accessibility
them. For organizations, this means they should makes it susceptible to exploitation from anywhere.
not only ensure regular updates for Apple OS but Consequently, organizations must prioritize robust
also consider implementing additional security security measures to safeguard their MSSQL
measures for Mac devices. servers and prevent potential data breaches.
Overall, vulnerabilities in operating systems MySQL, despite having the highest total number of
account for around 75% of vulnerabilities analyzed vulnerabilities over three years, shows promising
in this research. progress with a 64% decrease in total vulnerabilities
in 2023.
Software Vulnerability
Software Ratings
Vulnerability Report
Ratings 2024
Report 2024 55
MSSQL experienced an astonishing TREND 5
1600% surge in critical vulnerabilities,
totaling 17, all RCEs. Spike in RCEs and Exploited Vulnerabilities
Raises Concerns about Edge Security.
* THE NOTE:
While security experts noted a significant drop in enrichment data uploads on the NVD starting February 12, 2024, the
above note was made after the enrichment was completely suspended starting May 9, 2024. However, within the next
five days, the vulnerability upload process started again, albeit slowly, with months of vulnerability backlog remaining.
Software Vulnerability
Software Ratings
Vulnerability Report
Ratings 2024
Report 2024 66
Methodology
Enterprise software categories were defined This metric is valuable because it indicates
based on criteria of popularity, criticality in use by the software’s susceptibility to exploitation,
organizations, and the total number of vulnerabilities highlighting the diligence of developers in preventing
found. Some categories, such as text editors, vulnerabilities rather than merely addressing them
database management clients, cloud storage apps, after they have been exploited by hackers. For
and archivers, were excluded due to a lack of a example, if the metric is high, meaning that most
representative number of vulnerabilities in apps known vulnerabilities were exploited despite a low
within the category, rendering them not relevant to total number of vulnerabilities, it can signify a lack
this study. of an efficient vulnerability management process
in a vendor’s organization. Conversely, if the
The criteria used are based on the CISA KEV catalog. metric is low, even with a high number of exploited
vulnerabilities but with a significantly larger total
We also kept track of RCE vulnerabilities, which number of vulnerabilities, it can suggest a working
are the most dangerous because they enable vulnerability management process on the vendor’s
remote code execution on a target system via the side. The latter scenario could also indicate that the
vulnerable software. product’s code is either lacking in security or highly
attractive to threat actors due to its popularity, as
Additionally, the report utilizes the exploitation rate seen with Microsoft or Google. If the software has
as a metric to demonstrate the ratio of exploited zero exploited vulnerabilities and a large number
vulnerabilities to the total number of vulnerabilities. of total vulnerabilities, it is a sign of a proper patch
The exploitation rate formula** is as follows: management process in a vendor’s company.
Software Vulnerability
Software Ratings
Vulnerability Report
Ratings 2024
Report 2024 77
Although the exploitation rate formula alone is not sufficient to evaluate the risks associated with certain
software, it can be part of a broader set of metrics to measure a vendor’s security performance, especially if
combined with other qualitative and quantitative data points.
The data on vulnerabilities for 2021, including their types and exploitation rates, and the data on total vulnerabilities
over the three-year period analyzed, are presented in the Appendix.
In the tables with vulnerability data per category year over year, exclamation marks were added to highlight
dominating values of vulnerabilities in specific apps, whether by total number or by a specific type of vulnerability.
** DISCLAIMER:
The formula only considers the number of exploited vulnerabilities in relation to the total number of known
vulnerabilities. It doesn’t take into account the severity of the vulnerabilities, the potential impact of exploitation,
the number of exploitation attempts, or the ease of exploitation – criteria that should also be considered when
evaluating risks associated with a particular software.
Not all exploited vulnerabilities are reported, so the numerator in the formula may be underestimated. Similarly, not
all vulnerabilities in software may have been discovered or disclosed.
The timing of the patch release and vulnerability exploitation are other important criteria that are not considered
within the formula.
Software Vulnerability
Software Ratings
Vulnerability Report
Ratings 2024
Report 2024 88
Enterprise Software Categories
iOS 8% 4%
Microsoft Office 7% 2%
MacOS 7% 3%
Edge 7% 5%
MS Windows 10 4% 4%
Firefox 3% 4%
Adobe Reader 2% 0
In 2023, the software analyzed in this research exhibited the highest exploitation rates compared to other years
under review, indicating an intensified threat landscape. The table above showcases the ratings of the software
applications with the highest exploitation rates in 2023, along with their rates back in 2022, enabling us to observe
any changes where applicable. The software marked as ‘New’ indicates that these applications appeared for the
first time during the three-year period analyzed (meaning they reported exploited vulnerabilities in 2023 only).
This highlights the emergence of a new trend among hackers in exploiting perimeter software, specifically load
balancers.
Another significant finding is Citrix with an exploitation rate of 57%, which experienced several exploited
vulnerabilities under the name CitrixBleed.
Additionally, there are unusually high exploitation rates for iOS, Microsoft Office, MacOS, and Microsoft Edge in
2023, all showing a significant increase from 2022.
Note: The exploitation rate values here and in the main part of the report have been rounded for ease of visual
perception and clarity. Detailed values with decimal places are provided in the Appendix.
*** None of the 62 analyzed applications reported in total only one vulnerability that was exploited. (We excluded
detailed analysis on 15 applications from the research report due to the low significance of the findings.)
The report reveals a concerning trend for cybersecurity specialists: the overall number of vulnerabilities has
increased from 2021 to 2023 across software categories analyzed, as well as the number of exploited and RCE
vulnerabilities.
Exploited 74 88 107
Antivirus 61 25
Image Editors 86 44
Video Editors 39 16
VPN Clients 42 17
Load Balancers 25 5
Databases 37 263
Antivirus 86 0.7%
Total 12711
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Desktop Operating
1562 -9% 1033 -15% 504 5% 25 47% 396 1% 56 0%
Systems
MS Windows
501 -3% 390 -6% 111 12% 0 -100% 177 13% 18 0%
Server 2016
Medium 2022
Critical 2022
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2022
Low 2022
Exploited
Name
2022
2022
2022
2022
2022
2022
2022
2022
All
Desktop Operating
1709 6% 1212 6% 480 6% 17 13% 391 27% 56 30%
Systems
MS Windows
514 2% 414 6% 99 -12% 1 0% 157 25% 18 13%
Server 2016
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Mobile Operating
1883 9% 685 -21% 1152 51% 46 -54% 67 -25% 23 109%
Systems
iOS 268 10% 121 -22% 122 54% 25 178% 43 -40% 20 100%
Android 1421 16% 401 -19% 1001 54% 19 -77% 24 41% 3 200%
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Mobile Operating
1723 49% 862 34% 761 60% 100 178% 89 31% 11 -21%
Systems
Android 1223 86% 494 55% 648 104% 81 286% 17 -39% 1 N/A
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name 2023
2022
2022
2022
2022
2022
2023
2022
All
Remote Management
2 -67% 1 -75% 1 0% 0 -100% 0 -100% 0 N/A
Software
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Remote Management
6 -33% 4 -43% 1 -50% 1 N/A 2 100% 0 N/A
Software
The absence of reported exploited vulnerabilities suggests that effective mitigation strategies are in place.
The trend of critical vulnerabilities is also decreasing, which is promising. The highest number of critical
vulnerabilities was found in AnyDesk - 4, second is TeamViewer with 3, third place is split between RealVNC
and Splashtop - 2.
AnyDesk stands out for having 1 critical vulnerability out of a total of 5 in 2023, highlighting the need for
continued vigilance even in years when fewer vulnerabilities are reported overall.
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name 2023
2022
2022
2022
2022
2022
2023
2022
All
Password Manager
6 100% 3 200% 3 50% 0 N/A 0 N/A 0 N/A
Clients
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Password Manager
3 0% 1 N/A 2 -33% 0 N/A 0 -100% 0 N/A
Clients
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name 2023
2022
2022
2022
2022
2022
2023
2022
All
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
RCE vulnerabilities have been identified in Bitdefender, Kaspersky, and McAfee over the three-year period, with
Bitdefender having the most (3). Since RCEs can allow attackers to run arbitrary code on victim machines, their
presence is concerning despite the low numbers. The lack of widespread exploitation of these vulnerabilities
may indicate that antivirus vendors are generally quick to patch them, or that these vulnerabilities are not
easily exploitable. At the same time, the presence of a single exploited vulnerability in McAfee back in 2021
demonstrates that risks to end users can materialize.
While there are variations in the number and severity of vulnerabilities across
antivirus vendors, the overall trend suggests security improvements.
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Web Browsers 536 -3% 294 -19% 238 29% 4 100% 14 133% 14 -22%
Chrome 296 -17% 180 -30% 115 15% 1 N/A 5 N/A 5 -50%
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Web Browsers 551 -3% 364 -1% 185 -8% 2 100% 6 0% 18 157%
While Chrome has the highest number of total Notably, Chrome reduced its exploited vulnerabilities
vulnerabilities over the three-year period analyzed, by 50% in 2023, totaling 5 and bringing it to the
Edge’s record number of 14 RCE vulnerabilities same number as Firefox, indicating security
over the same timeframe, which continues to improvements. However, its tally of exploited
grow, is an alarming insight for us. Specifically, vulnerabilities over three years - 21 - is the highest
it spiked at 17% in 2023, following a staggering among the web browsers analyzed, suggesting
500% growth in 2022. This trend is concerning for Chrome may be a more targeted browser for
the vendor, despite Edge having a relatively lower attackers, likely due to its massive user base.
total number of vulnerabilities. Overall, the total
number of RCEs accounts for 1% for Chrome and The trends and facts underscore the continued
Firefox and 10% for Edge. need for aggressive vulnerability management,
timely patching, and the importance of security
research to uncover and mitigate potential threats
across all browsers.
Edge’s record number of 14 RCE
vulnerabilities over three years,
which continues to grow, is
alarming.
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Vulnerabilities
Medium 2023
Critical 2023
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
YoY 2023-
RCE 2023
Low 2023
Exploited
Name
2023
2022
2022
2022
2022
2022
2023
2022
All
Total 4359 -2% 2254 -15% 2023 22% 82 -41% 540 1% 107 22%
Medium 2022
Critical 2022
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
YoY 2022-
RCE 2022
Low 2022
Exploited
Name
2022
2021
2021
2021
2021
2021
2022
2021
All
Total 4449 13% 2658 6% 1653 20% 138 156% 536 3% 88 19%
All Vulnerabilities
Name 2021 Critical 2021 Medium 2021 Low 2021 RCE 2021 Exploited
Desktop Operating
1614 1148 451 15 309 43
Systems
MS Windows Server
503 390 112 1 126 16
2016
Linux 162 80 74 8 5 0
Desktop Operating
4885 1096 155 3
Systems
MS Windows Server
1518 460 52 3
2016
Linux 784 26 9 1
Mobile Operating
1154 641 477 36 68 14
Systems
HarmonyOs 118 86 28 4 1 0
Mobile Operating
4760 224 48 1
Systems
HarmonyOs 569 1 0 0
Libre Office 4 3 1 0 0 0
Open Office 7 5 2 0 0 0
Libre Office 14 1 0 0
Open Office 12 0 0 0
Remote Management
9 7 2 0 1 0
Software
TeamViewer 2 2 0 0 1 0
DameWare 1 1 0 0 0 0
Splashtop 2 2 0 0 0 0
AnyDesk 3 2 1 0 0 0
RealVNC 1 0 1 0 0 0
Remote Management
17 3 0 0
Software
TeamViewer 6 3 0 0
DameWare 1 0 0 0
Splashtop 2 0 0 0
AnyDesk 5 0 0 0
RealVNC 3 0 0 0
Software Vulnerability Ratings Report 2024 43
TABLE 41. DOCUMENT VIEWERS 2021 VULNERABILITY ANALYSIS
Adobe Reader 92 58 34 0 1 2
Foxit Reader 98 71 27 0 63 0
Nitro PDF 3 3 0 0 0 0
Nitro PDF 3 0 0 0
Password Manager
3 0 3 0 1 0
Сlients
Keepass 0 0 0 0 0 0
Keepass XC 0 0 0 0 0 0
1Password 3 0 3 0 1 0
Bitwarden 0 0 0 0 0 0
LastPass 0 0 0 0 0 0
Password Manager
12 1 0 0
Сlients
Keepass 3 0 0 0
Keepass XC 1 0 0 0
1Password 5 1 0 0
Bitwarden 3 0 0 0
LastPass 0 0 0 0
Antivirus 45 31 14 0 4 1
Avast 7 6 1 0 0 0
Bitdefender 14 10 4 0 3 0
Malwarebytes 1 1 0 0 0 0
Eset 2 0 2 0 0 0
Kaspersky 8 5 3 0 0 0
McAfee 13 9 4 0 1 1
Antivirus 86 7 1 1
Avast 17 1 0 0
Bitdefender 22 3 0 0
Malwarebytes 8 0 0 0
Eset 10 0 0 0
Kaspersky 11 1 0 0
McAfee 18 2 1 6
Image Editors 31 27 4 0 2 0
Adobe Photoshop 15 14 1 0 0 0
Gimp 1 1 0 0 0 0
Paint.Net 0 0 0 0 0 0
Adobe Illustrator 15 12 3 0 2 0
Adobe Photoshop 58 4 0 0
Gimp 3 0 0 0
Paint.Net 0 0 0 0
Adobe Illustrator 69 4 0 0
Firefox 134 64 69 1 0 0
Edge 81 52 29 0 1 1
Chrome 1006 10 21 2
Firefox 471 2 11 2
Edge 178 14 7 4
VPN Clients 32 22 10 0 11 0
FortiClient 7 4 3 0 0 0
OpenVPN 9 7 2 0 0 0
WireGuard 1 0 1 0 0 0
VPN Clients 60 13 0 0
FortiClient 24 1 0 0
OpenVPN 16 0 0 0
WireGuard 2 0 0 0
LoadBalancers 9 8 1 0 0 0
HaProxy 4 3 1 0 0 0
Citrix 2 2 0 0 0 0
NGINX 3 3 0 0 0 0
LoadBalancers 30 1 5 17
HaProxy 11 0 0 0
Citrix 9 1 4 44
NGINX 10 0 1 10
Postgresql 7 3 4 0 2 0
MSSQL 1 1 0 0 0 0
Oracle DB 7 0 6 1 0 0
Databases 322 23 2 1
MYSQL 279 0 2 1
Postgresql 22 5 0 0
MSSQL 21 18 0 0
Oracle DB 20 0 0 0
Software Vulnerability Ratings Report 2024 49
TABLE 57. TOP EXPLOITED SOFTWARE SUMMARY 2021-2023 TABLE 58. TOP EXPLOITED SOFTWARE 2022
Category Name Total Exploitation Rate, % Category Name Exploitation Rate 2022, %
Citrix 44 Edge 5
NGINX 10 iOS 4
McAfee 6 MS Windows 10 4
MacOS 4
Chrome 3
MS Windows 10 3
Linux 2
MS Windows
3 MYSQL 2
Server 2016
McAfee 8
Microsoft Office 7
iOS 4
MS Windows 10 3
MacOS 3
Adobe Reader 2
Chrome 2
Edge 1
Software Vulnerability Ratings Report 2024 50
TABLE 60. EXPLOITATION RATES OF SOFTWARE PER CATEGORY 2021-2023
MS Windows Server
3.2% 3.5% 3.6%
Desktop Operating 2016
Systems
MacOS 2.6% 3.3% 6.9%
www.action1.com/resources/research/
Action1 was founded by cybersecurity veterans Alex Vovk and Mike Walters, who previously founded Netwrix,
which was acquired by TA Associates. Learn more at: www.action1.com.