CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2014

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Internet Explorer Microsoft Application 243
2 Mac Os X Apple OS 150
3 Linux Kernel Linux OS 133
4 Chrome Google Application 127
5 Iphone Os Apple OS 120
6 JRE Oracle Application 115
7 JDK Oracle Application 115
8 Firefox Mozilla Application 108
9 Ubuntu Linux Canonical OS 106
10 Opensuse Novell OS 101
11 Apple Tv Apple Application 81
12 Flash Player Adobe Application 76
13 Safari Apple Application 71
14 Thunderbird Mozilla Application 64
15 Mysql Oracle Application 63
16 Debian Linux Debian OS 62
17 Owncloud Owncloud Application 58
18 Fusion Middleware Oracle Application 57
19 Firefox Esr Mozilla Application 57
20 Seamonkey Mozilla Application 55
21 Fedora Fedoraproject OS 49
22 Moodle Moodle Application 48
23 IOS Cisco OS 47
24 Adobe Air Sdk Adobe Application 45
25 Adobe Air Adobe Application 45
26 Acrobat Reader Adobe Application 44
27 Acrobat Adobe Application 43
28 XEN XEN OS 42
29 Database Server Oracle Application 40
30 Plone Plone Application 40
31 Unified Communications Manager Cisco Application 39
32 Mysql Mysql Application 38
33 Windows 8.1 Microsoft OS 38
34 Windows Server 2012 Microsoft OS 38
35 Windows 8 Microsoft OS 38
36 Windows Server 2008 Microsoft OS 38
37 Websphere Portal IBM Application 36
38 Windows 7 Microsoft OS 36
39 Qemu Qemu Application 36
40 Enterprise Linux Redhat OS 35
41 Peoplesoft Products Oracle Application 35
42 Windows Vista Microsoft OS 34
43 PHP PHP Application 32
44 Supply Chain Products Suite Oracle Application 31
45 Windows Rt Microsoft OS 30
46 Sunos SUN OS 29
47 Windows Rt 8.1 Microsoft OS 29
48 Wireshark Wireshark Application 29
49 Wordpress Wordpress Application 29
50 Websphere Application Server IBM Application 28
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
524
422
133
127
456
284
106
101
253
62
58
49
48
86
42
40
38
64
36
35
32
29
29
29
 
Microsoft 524
Apple 422
Linux 133
Google 127
Oracle 456
Mozilla 284
Canonical 106
Novell 101
Adobe 253
Debian 62
Owncloud 58
Fedoraproject 49
Moodle 48
Cisco 86
XEN 42
Plone 40
Mysql 38
IBM 64
Qemu 36
Redhat 35
PHP 32
SUN 29
Wireshark 29
Wordpress 29
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.