CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2017

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Android Google OS 840
2 Debian Linux Debian OS 734
3 Linux Kernel Linux OS 449
4 Iphone Os Apple OS 388
5 Imagemagick Imagemagick Application 357
6 Mac Os X Apple OS 304
7 Windows 10 Microsoft OS 262
8 Windows Server 2016 Microsoft OS 247
9 Windows Server 2008 Microsoft OS 242
10 Windows Server 2012 Microsoft OS 234
11 Windows 7 Microsoft OS 229
12 Ubuntu Linux Canonical OS 224
13 Tvos Apple OS 224
14 Windows 8.1 Microsoft OS 223
15 Enterprise Linux Desktop Redhat OS 207
16 Enterprise Linux Server Redhat OS 205
17 Enterprise Linux Workstation Redhat OS 192
18 Safari Apple Application 183
19 Windows Rt 8.1 Microsoft OS 179
20 Watchos Apple OS 135
21 Tcpdump Tcpdump Application 133
22 Fedora Fedoraproject OS 113
23 Binutils GNU Application 106
24 Leap Opensuse OS 91
25 Mysql Oracle Application 85
26 Enterprise Linux Server Aus Redhat OS 81
27 Enterprise Linux Server Tus Redhat OS 74
28 Graphicsmagick Graphicsmagick Application 72
29 JDK Oracle Application 69
30 JRE Oracle Application 69
31 Stdu Viewer Stdutility Application 68
32 Qemu Qemu Application 65
33 Chrome Google Application 64
34 Windows Vista Microsoft OS 64
35 XEN XEN OS 62
36 Acrobat Reader Dc Adobe Application 62
37 Acrobat Dc Adobe Application 62
38 Acrobat Adobe Application 62
39 Acrobat Reader Adobe Application 62
40 Opensuse Opensuse OS 61
41 Foxit Reader Foxitsoftware Application 60
42 Libtiff Libtiff Application 60
43 Enterprise Linux Server Eus Redhat OS 59
44 Wireshark Wireshark Application 58
45 NTP NTP Application 57
46 Jasper Jasper Project Application 55
47 Autotrace Autotrace Project Application 51
48 Ffmpeg Ffmpeg Application 47
49 Wordpress Wordpress Application 46
50 Advanced Outbound Telephony Oracle Application 44
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
904
734
449
1234
357
1680
224
818
133
113
106
152
267
72
68
65
62
248
60
60
58
57
55
51
47
46
 
Google 904
Debian 734
Linux 449
Apple 1234
Imagemagick 357
Microsoft 1680
Canonical 224
Redhat 818
Tcpdump 133
Fedoraproject 113
GNU 106
Opensuse 152
Oracle 267
Graphicsmagick 72
Stdutility 68
Qemu 65
XEN 62
Adobe 248
Foxitsoftware 60
Libtiff 60
Wireshark 58
NTP 57
Jasper Project 55
Autotrace Project 51
Ffmpeg 47
Wordpress 46
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.