Skip to main content
HomeTopicsVulnerabilities

Vulnerabilities

We've curated 267 cybersecurity statistics about Vulnerabilities to help you understand how software weaknesses and system flaws are being exploited by cybercriminals in 2025. This insight can guide you in fortifying your defenses effectively.

Showing 201-220 of 267 results

84% said that supply chain vulnerabilities were the most significant threat to their enterprise applications.

ArmorCode & Purple Book Community4/28/2025
Application securityEnterprise

49% measure success of vulnerability remediation by mean time to remediation.

Seemplicity4/28/2025
Vulnerability remediationRemediation

91% of organizations experience delays in vulnerability remediation.

Seemplicity4/28/2025
Vulnerability remediation

74% of respondents identify a lack of understanding of every potential source of vulnerability as their biggest challenge to effective vulnerability management.

Optiv4/28/2025
Vulnerability management

61% of organizations still measure success of vulnerability remediation by the number of vulnerabilities resolved.

Seemplicity4/28/2025
Vulnerability remediation

54% measure success of vulnerability remediation by fewer breaches.

Seemplicity4/28/2025
Vulnerability remediationData breach

57% of respondents report automation has reduced the time to respond to vulnerabilities.

Optiv4/28/2025
Automation

Managing the sheer volume of vulnerabilities and false positives were the biggest challenges in securing code, cited by 78% of respondents.

ArmorCode & Purple Book Community4/28/2025
Application securityFalse positives

34% of respondents report seeing significant improvements in vulnerability response time due to automation.

Optiv4/28/2025
AutomationVulnerability management

Open-source risks and cloud misconfigurations followed supply chain vulnerabilities closely at 73%.

ArmorCode & Purple Book Community4/28/2025
Application securitySupply chain

91% of organizations experience delays in vulnerability remediation.

Seemplicity4/28/2025
Vulnerability remediation

25% of reported security issues in Agentic AI remain open.

Wallarm4/24/2025
AIAgentic AI

60% of top vulnerabilities found in Agentic AIwere access control-related

Wallarm4/24/2025
AIAgentic AI

86% of security alerts escalate into tickets, which indicates that most alerts still require human validation.

N-able4/24/2025
Security alerts

86% of security alerts escalate into tickets, which indicates that most alerts still require human validation.

N-able4/24/2025
Security alerts

Prompts specifying a need for security or requesting OWASP best practices produced more secure results, yet still yielded some code vulnerabilities for 5 out of the 7 LLMs tested.

Backslash Security4/24/2025
AILLMs

When prompted to generate secure code, GPT-4o still produced insecure outputs vulnerable to 8 out of 10 issues.

Backslash Security4/24/2025
AILLMs

Some open security issues in Agentic AI are lingering for 1,200-plus days.

Wallarm4/24/2025
AIAgentic AI

In response to simple, “naive” prompts, all LLMs tested generated insecure code vulnerable to at least 4 of the 10 common CWEs.

Backslash Security4/24/2025
AILLMs

With naive prompts, ChatGPT scored a 1.5/10 secure code result.

Backslash Security4/24/2025
AILLMs