CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2014

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Internet Explorer Microsoft Application 243
2 Mac Os X Apple OS 148
3 Linux Kernel Linux OS 133
4 Chrome Google Application 127
5 Iphone Os Apple OS 120
6 JRE Oracle Application 115
7 JDK Oracle Application 115
8 Firefox Mozilla Application 108
9 Ubuntu Linux Canonical OS 94
10 Apple Tv Apple Application 81
11 Opensuse Novell OS 79
12 Flash Player Adobe Application 76
13 Safari Apple Application 71
14 Thunderbird Mozilla Application 64
15 Mysql Oracle Application 63
16 Owncloud Owncloud Application 58
17 Firefox Esr Mozilla Application 57
18 Fusion Middleware Oracle Application 57
19 Seamonkey Mozilla Application 55
20 Moodle Moodle Application 48
21 IOS Cisco OS 47
22 Adobe Air Sdk Adobe Application 45
23 Adobe Air Adobe Application 45
24 Debian Linux Debian OS 44
25 Acrobat Reader Adobe Application 44
26 Acrobat Adobe Application 43
27 XEN XEN OS 42
28 Plone Plone Application 40
29 Database Server Oracle Application 40
30 Unified Communications Manager Cisco Application 39
31 Windows Server 2008 Microsoft OS 38
32 Windows 8.1 Microsoft OS 38
33 Windows Server 2012 Microsoft OS 38
34 Windows 8 Microsoft OS 38
35 Mysql Mysql Application 38
36 Fedora Fedoraproject OS 37
37 Websphere Portal IBM Application 36
38 Windows 7 Microsoft OS 36
39 Qemu Qemu Application 36
40 Peoplesoft Products Oracle Application 35
41 Windows Vista Microsoft OS 34
42 Enterprise Linux Redhat OS 34
43 PHP PHP Application 32
44 Supply Chain Products Suite Oracle Application 31
45 Windows Rt Microsoft OS 30
46 Wordpress Wordpress Application 29
47 Windows Rt 8.1 Microsoft OS 29
48 Sunos SUN OS 29
49 Wireshark Wireshark Application 29
50 Websphere Application Server IBM Application 28
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
524
420
133
127
456
284
94
79
253
58
48
86
44
42
40
38
37
64
36
34
32
29
29
29
 
Microsoft 524
Apple 420
Linux 133
Google 127
Oracle 456
Mozilla 284
Canonical 94
Novell 79
Adobe 253
Owncloud 58
Moodle 48
Cisco 86
Debian 44
XEN 42
Plone 40
Mysql 38
Fedoraproject 37
IBM 64
Qemu 36
Redhat 34
PHP 32
Wordpress 29
SUN 29
Wireshark 29
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.