Skip to main content
HomeTopicsVulnerabilities

Vulnerabilities

We've curated 267 cybersecurity statistics about Vulnerabilities to help you understand how software weaknesses and system flaws are being exploited by cybercriminals in 2025. This insight can guide you in fortifying your defenses effectively.

Showing 201-220 of 267 results

84% said that supply chain vulnerabilities were the most significant threat to their enterprise applications.

ArmorCode & Purple Book Community4/28/2025
Application securityEnterprise

57% of respondents report automation has reduced the time to respond to vulnerabilities.

Optiv4/28/2025
Automation

Managing the sheer volume of vulnerabilities and false positives were the biggest challenges in securing code, cited by 78% of respondents.

ArmorCode & Purple Book Community4/28/2025
Application securityFalse positives

Over 40,000 new vulnerabilities were added to the National Vulnerability Database in 2024. This marks a 39% rise from 2023.

Fortinet4/28/2025

85% of organizations believe their cross-team collaboration is strong.

Seemplicity4/28/2025
Vulnerability remediation

34% of respondents report seeing significant improvements in vulnerability response time due to automation.

Optiv4/28/2025
AutomationVulnerability management

Open-source risks and cloud misconfigurations followed supply chain vulnerabilities closely at 73%.

ArmorCode & Purple Book Community4/28/2025
Application securitySupply chain

1 in 5 organizations take four or more days to fix critical vulnerabilities.

Seemplicity4/28/2025
Vulnerability remediation

Nearly 40% of organizations still rely on manual workflows for most of their vulnerability remediation processes.

Seemplicity4/28/2025
Vulnerability remediation

91% of organizations experience delays in vulnerability remediation.

Seemplicity4/28/2025
Vulnerability remediation

Fewer than 1 in 5 organizations use structured prioritization models.

Seemplicity4/28/2025
Vulnerability remediation

Prompts specifying a need for security or requesting OWASP best practices produced more secure results, yet still yielded some code vulnerabilities for 5 out of the 7 LLMs tested.

Backslash Security4/24/2025
AILLMs

Over 700 issues in Agentic AI repositories remain unaddressed.

Wallarm4/24/2025
AIAgentic AI

When prompted to generate secure code, GPT-4o still produced insecure outputs vulnerable to 8 out of 10 issues.

Backslash Security4/24/2025
AILLMs

86% of security alerts escalate into tickets, which indicates that most alerts still require human validation.

N-able4/24/2025
Security alerts

With naive prompts, ChatGPT scored a 1.5/10 secure code result.

Backslash Security4/24/2025
AILLMs

25% of reported security issues in Agentic AI remain open.

Wallarm4/24/2025
AIAgentic AI

In response to simple, “naive” prompts, all LLMs tested generated insecure code vulnerable to at least 4 of the 10 common CWEs.

Backslash Security4/24/2025
AILLMs

Claude 3.7 Sonnet scored 10/10 with security-focused prompts.

Backslash Security4/24/2025
AILLMs

60% of top vulnerabilities found in Agentic AIwere access control-related

Wallarm4/24/2025
AIAgentic AI