CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2014

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Internet Explorer Microsoft Application 243
2 Mac Os X Apple OS 146
3 Linux Kernel Linux OS 133
4 Chrome Google Application 127
5 Iphone Os Apple OS 120
6 JRE Oracle Application 115
7 JDK Oracle Application 115
8 Firefox Mozilla Application 108
9 Ubuntu Linux Canonical OS 93
10 Apple Tv Apple Application 81
11 Opensuse Novell OS 76
12 Flash Player Adobe Application 76
13 Safari Apple Application 71
14 Thunderbird Mozilla Application 64
15 Mysql Oracle Application 63
16 Owncloud Owncloud Application 58
17 Firefox Esr Mozilla Application 57
18 Fusion Middleware Oracle Application 57
19 Seamonkey Mozilla Application 55
20 Moodle Moodle Application 48
21 IOS Cisco OS 47
22 Adobe Air Sdk Adobe Application 45
23 Adobe Air Adobe Application 45
24 Acrobat Reader Adobe Application 44
25 Debian Linux Debian OS 43
26 Acrobat Adobe Application 43
27 XEN XEN OS 42
28 Plone Plone Application 40
29 Database Server Oracle Application 40
30 Unified Communications Manager Cisco Application 39
31 Windows Server 2012 Microsoft OS 38
32 Windows 8 Microsoft OS 38
33 Windows Server 2008 Microsoft OS 38
34 Mysql Mysql Application 38
35 Windows 8.1 Microsoft OS 38
36 Windows 7 Microsoft OS 36
37 Qemu Qemu Application 36
38 Websphere Portal IBM Application 36
39 Peoplesoft Products Oracle Application 35
40 Windows Vista Microsoft OS 34
41 Enterprise Linux Redhat OS 33
42 Fedora Fedoraproject OS 32
43 PHP PHP Application 32
44 Supply Chain Products Suite Oracle Application 31
45 Windows Rt Microsoft OS 30
46 Wireshark Wireshark Application 29
47 Sunos SUN OS 29
48 Windows Rt 8.1 Microsoft OS 29
49 Wordpress Wordpress Application 29
50 Websphere Application Server IBM Application 28
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
524
418
133
127
456
284
93
76
253
58
48
86
43
42
40
38
36
64
33
32
32
29
29
29
 
Microsoft 524
Apple 418
Linux 133
Google 127
Oracle 456
Mozilla 284
Canonical 93
Novell 76
Adobe 253
Owncloud 58
Moodle 48
Cisco 86
Debian 43
XEN 42
Plone 40
Mysql 38
Qemu 36
IBM 64
Redhat 33
Fedoraproject 32
PHP 32
Wireshark 29
SUN 29
Wordpress 29
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.