CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2017

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Android Google OS 840
2 Debian Linux Debian OS 686
3 Linux Kernel Linux OS 449
4 Iphone Os Apple OS 388
5 Imagemagick Imagemagick Application 357
6 Mac Os X Apple OS 303
7 Windows 10 Microsoft OS 262
8 Windows Server 2016 Microsoft OS 247
9 Windows Server 2008 Microsoft OS 242
10 Windows Server 2012 Microsoft OS 234
11 Windows 7 Microsoft OS 229
12 Tvos Apple OS 224
13 Windows 8.1 Microsoft OS 223
14 Ubuntu Linux Canonical OS 217
15 Safari Apple Application 183
16 Windows Rt 8.1 Microsoft OS 179
17 Watchos Apple OS 135
18 Tcpdump Tcpdump Application 133
19 Enterprise Linux Server Redhat OS 121
20 Enterprise Linux Desktop Redhat OS 118
21 Fedora Fedoraproject OS 111
22 Binutils GNU Application 106
23 Enterprise Linux Workstation Redhat OS 103
24 Leap Opensuse OS 90
25 Mysql Oracle Application 85
26 Enterprise Linux Server Aus Redhat OS 72
27 Graphicsmagick Graphicsmagick Application 72
28 JDK Oracle Application 69
29 JRE Oracle Application 69
30 Stdu Viewer Stdutility Application 68
31 Enterprise Linux Server Tus Redhat OS 65
32 Qemu Qemu Application 65
33 Windows Vista Microsoft OS 64
34 Chrome Google Application 64
35 XEN XEN OS 62
36 Acrobat Reader Dc Adobe Application 62
37 Acrobat Dc Adobe Application 62
38 Acrobat Adobe Application 62
39 Acrobat Reader Adobe Application 62
40 Opensuse Opensuse OS 61
41 Libtiff Libtiff Application 60
42 Foxit Reader Foxitsoftware Application 60
43 Enterprise Linux Server Eus Redhat OS 59
44 Wireshark Wireshark Application 58
45 NTP NTP Application 57
46 Jasper Jasper Project Application 55
47 Autotrace Autotrace Project Application 51
48 Ffmpeg Ffmpeg Application 47
49 Wordpress Wordpress Application 46
50 Advanced Outbound Telephony Oracle Application 44
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
904
686
449
1233
357
1680
217
133
538
111
106
151
267
72
68
65
62
248
60
60
58
57
55
51
47
46
 
Google 904
Debian 686
Linux 449
Apple 1233
Imagemagick 357
Microsoft 1680
Canonical 217
Tcpdump 133
Redhat 538
Fedoraproject 111
GNU 106
Opensuse 151
Oracle 267
Graphicsmagick 72
Stdutility 68
Qemu 65
XEN 62
Adobe 248
Libtiff 60
Foxitsoftware 60
Wireshark 58
NTP 57
Jasper Project 55
Autotrace Project 51
Ffmpeg 47
Wordpress 46
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.