CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2014

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Internet Explorer Microsoft Application 243
2 Mac Os X Apple OS 146
3 Linux Kernel Linux OS 133
4 Chrome Google Application 127
5 Iphone Os Apple OS 120
6 JRE Oracle Application 115
7 JDK Oracle Application 115
8 Firefox Mozilla Application 108
9 Ubuntu Linux Canonical OS 91
10 Apple Tv Apple Application 81
11 Flash Player Adobe Application 76
12 Safari Apple Application 71
13 Opensuse Novell OS 70
14 Thunderbird Mozilla Application 64
15 Mysql Oracle Application 63
16 Owncloud Owncloud Application 58
17 Fusion Middleware Oracle Application 57
18 Firefox Esr Mozilla Application 57
19 Seamonkey Mozilla Application 55
20 Moodle Moodle Application 48
21 IOS Cisco OS 47
22 Adobe Air Sdk Adobe Application 45
23 Adobe Air Adobe Application 45
24 Acrobat Reader Adobe Application 44
25 Acrobat Adobe Application 43
26 XEN XEN OS 42
27 Database Server Oracle Application 40
28 Debian Linux Debian OS 40
29 Plone Plone Application 40
30 Unified Communications Manager Cisco Application 39
31 Windows 8.1 Microsoft OS 38
32 Windows Server 2012 Microsoft OS 38
33 Mysql Mysql Application 38
34 Windows 8 Microsoft OS 38
35 Windows Server 2008 Microsoft OS 38
36 Windows 7 Microsoft OS 36
37 Qemu Qemu Application 36
38 Websphere Portal IBM Application 36
39 Peoplesoft Products Oracle Application 35
40 Windows Vista Microsoft OS 34
41 Enterprise Linux Redhat OS 33
42 PHP PHP Application 32
43 Fedora Fedoraproject OS 32
44 Supply Chain Products Suite Oracle Application 31
45 Windows Rt Microsoft OS 30
46 Sunos SUN OS 29
47 Wireshark Wireshark Application 29
48 Wordpress Wordpress Application 29
49 Windows Rt 8.1 Microsoft OS 29
50 Websphere Application Server IBM Application 28
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
524
418
133
127
456
284
91
253
70
58
48
86
42
40
40
38
36
64
33
32
32
29
29
29
 
Microsoft 524
Apple 418
Linux 133
Google 127
Oracle 456
Mozilla 284
Canonical 91
Adobe 253
Novell 70
Owncloud 58
Moodle 48
Cisco 86
XEN 42
Debian 40
Plone 40
Mysql 38
Qemu 36
IBM 64
Redhat 33
PHP 32
Fedoraproject 32
SUN 29
Wireshark 29
Wordpress 29
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.