CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2014

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Internet Explorer Microsoft Application 243
2 Mac Os X Apple OS 135
3 Linux Kernel Linux OS 133
4 Chrome Google Application 127
5 Iphone Os Apple OS 120
6 JRE Oracle Application 115
7 JDK Oracle Application 115
8 Firefox Mozilla Application 108
9 Ubuntu Linux Canonical OS 86
10 Apple Tv Apple Application 81
11 Flash Player Adobe Application 76
12 Safari Apple Application 71
13 Opensuse Novell OS 66
14 Thunderbird Mozilla Application 64
15 Mysql Oracle Application 63
16 Owncloud Owncloud Application 58
17 Firefox Esr Mozilla Application 57
18 Fusion Middleware Oracle Application 57
19 Seamonkey Mozilla Application 55
20 Moodle Moodle Application 48
21 IOS Cisco OS 47
22 Adobe Air Sdk Adobe Application 45
23 Adobe Air Adobe Application 45
24 Acrobat Reader Adobe Application 44
25 Acrobat Adobe Application 43
26 XEN XEN OS 42
27 Database Server Oracle Application 40
28 Plone Plone Application 40
29 Unified Communications Manager Cisco Application 39
30 Windows Server 2008 Microsoft OS 38
31 Windows 8.1 Microsoft OS 38
32 Windows Server 2012 Microsoft OS 38
33 Mysql Mysql Application 38
34 Windows 8 Microsoft OS 38
35 Debian Linux Debian OS 36
36 Windows 7 Microsoft OS 36
37 Qemu Qemu Application 36
38 Websphere Portal IBM Application 36
39 Peoplesoft Products Oracle Application 35
40 Enterprise Linux Redhat OS 34
41 Windows Vista Microsoft OS 34
42 PHP PHP Application 32
43 Supply Chain Products Suite Oracle Application 31
44 Windows Rt Microsoft OS 30
45 Wireshark Wireshark Application 29
46 Wordpress Wordpress Application 29
47 Windows Rt 8.1 Microsoft OS 29
48 Sunos SUN OS 29
49 Websphere Application Server IBM Application 28
50 Fedora Fedoraproject OS 26
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
524
407
133
127
456
284
86
253
66
58
48
86
42
40
38
36
36
64
34
32
29
29
29
26
 
Microsoft 524
Apple 407
Linux 133
Google 127
Oracle 456
Mozilla 284
Canonical 86
Adobe 253
Novell 66
Owncloud 58
Moodle 48
Cisco 86
XEN 42
Plone 40
Mysql 38
Debian 36
Qemu 36
IBM 64
Redhat 34
PHP 32
Wireshark 29
Wordpress 29
SUN 29
Fedoraproject 26
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.