CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2014

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Internet Explorer Microsoft Application 211
2 JRE Oracle Application 115
3 JDK Oracle Application 115
4 Chrome Google Application 110
5 Linux Kernel Linux OS 101
6 Firefox Mozilla Application 97
7 Iphone Os Apple OS 97
8 Mac Os X Apple OS 86
9 Apple Tv Apple Application 66
10 Mysql Oracle Application 63
11 Thunderbird Mozilla Application 58
12 Owncloud Owncloud Application 58
13 Ubuntu Linux Canonical OS 57
14 Fusion Middleware Oracle Application 57
15 Safari Apple Application 57
16 Firefox Esr Mozilla Application 51
17 Flash Player Adobe Application 51
18 Adobe Air Sdk Adobe Application 45
19 Adobe Air Adobe Application 45
20 Seamonkey Mozilla Application 45
21 IOS Cisco OS 42
22 Database Server Oracle Application 39
23 Mysql Mysql Application 38
24 Plone Plone Application 37
25 XEN XEN OS 35
26 Peoplesoft Products Oracle Application 35
27 Unified Communications Manager Cisco Application 33
28 Moodle Moodle Application 33
29 Supply Chain Products Suite Oracle Application 31
30 Sunos SUN OS 29
31 Windows 8.1 Microsoft OS 29
32 Windows 8 Microsoft OS 29
33 Enterprise Linux Redhat OS 29
34 Windows Server 2012 Microsoft OS 29
35 Opensuse Novell OS 28
36 Windows Server 2008 Microsoft OS 28
37 Websphere Portal IBM Application 26
38 Windows 7 Microsoft OS 26
39 Mediawiki Mediawiki Application 25
40 Fedora Fedoraproject OS 25
41 Windows Vista Microsoft OS 24
42 PHP PHP Application 24
43 Acrobat Reader Adobe Application 24
44 Wireshark Wireshark Application 24
45 Junos Juniper OS 23
46 Advantech Webaccess Advantech Application 23
47 Acrobat Adobe Application 23
48 Websphere Application Server IBM Application 23
49 Ios Xe Cisco OS 22
50 Windows Rt Microsoft OS 22
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
398
455
110
101
251
306
58
57
188
97
38
37
35
33
29
29
28
49
25
25
24
24
23
23
 
Microsoft 398
Oracle 455
Google 110
Linux 101
Mozilla 251
Apple 306
Owncloud 58
Canonical 57
Adobe 188
Cisco 97
Mysql 38
Plone 37
XEN 35
Moodle 33
SUN 29
Redhat 29
Novell 28
IBM 49
Mediawiki 25
Fedoraproject 25
PHP 24
Wireshark 24
Juniper 23
Advantech 23
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.