Skip to main content
HomeTopicsVulnerabilities

Vulnerabilities

We've curated 267 cybersecurity statistics about Vulnerabilities to help you understand how software weaknesses and system flaws are being exploited by cybercriminals in 2025. This insight can guide you in fortifying your defenses effectively.

Showing 221-240 of 267 results

Claude 3.7 Sonnet scored 6/10 secure code result using naive prompts.

Backslash Security4/24/2025
AILLMs

OpenAI’s GPT-4o had the lowest performance, scoring a 1/10 secure code result using "naive" prompts.

Backslash Security4/24/2025
AILLMs

Claude 3.7 Sonnet scored 10/10 with security-focused prompts.

Backslash Security4/24/2025
AILLMs

Over 700 issues in Agentic AI repositories remain unaddressed.

Wallarm4/24/2025
AIAgentic AI

There was a 34% surge globally in vulnerability exploitation as an initial attack vector.

Verizon4/23/2025
Initial attack vector

The number of vulnerabilities has increased rapidly over the past eight years and grown threefold.

IBM 4/17/2025

Nearly a quarter of all vulnerabilities in the IBM X-Force Vulnerability Database have an associated weaponized exploit.

IBM 4/17/2025

60% of the top 10 vulnerabilities had been actively exploited or had a publicly available exploit from less than two weeks after disclosure to a zero day.

IBM 4/17/2025
Zero day

4 out of top 10 vulnerabilities most mentioned on the dark web are linked to sophisticated threat actors.

IBM 4/17/2025
Sophisticated threat actorsDark web

The Veeam vulnerability (CVE-2024-40711) and similar documented vulnerabilities played a role in nearly 15 percent of the cases Sophos MDR tracked involving malicious intrusions in 2024.

Sophos4/16/2025
Malicious intrusion

Obsolete and unpatched hardware and software constitute an ever-growing source of security vulnerabilities.

Sophos4/16/2025
Obsolote hardwareUnpatched hardware

69% of the highest-risk (serious) vulnerabilities are resolved.

Cobalt4/14/2025
Vulnerability managementVulnerability remediation

Median time to resolve issues of all criticalities stretches to 67 days.

Cobalt4/14/2025
Vulnerability managementVulnerability remediation

Less than half (48%) of vulnerabilities are remediated.

Cobalt4/14/2025
Vulnerability managementVulnerability remediation

46% of companies commit to fix critical vulnerabilities within just three days.

Cobalt4/14/2025
Vulnerability managementVulnerability remediation

LLM pentests yield the highest proportion of serious vulnerabilities (32%) than any other asset type tested.

Cobalt4/14/2025
LLMPen testing

Since 2017, the median time to resolve serious vulnerabilities has decreased dramatically—from 112 days down to 37 days last year.

Cobalt4/14/2025
Vulnerability remediationVulnerability management

Most companies set ambitious service-level agreements (SLA) requiring vulnerabilities to be fixed within 14 days.

Cobalt4/14/2025
SLAs

Only 21% of serious vulnerabilities discovered in LLM tests are being resolved.

Cobalt4/14/2025
LLMPen testing

This represents a cut of 75 days, or two-thirds.

Cobalt4/14/2025
Vulnerability remediationVulnerability management