CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2018

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Debian Linux Debian OS 1349
2 Ubuntu Linux Canonical OS 838
3 Android Google OS 609
4 Enterprise Linux Server Redhat OS 549
5 Enterprise Linux Workstation Redhat OS 531
6 Enterprise Linux Desktop Redhat OS 522
7 Firefox Mozilla Application 291
8 Enterprise Linux Server Eus Redhat OS 281
9 Enterprise Linux Server Aus Redhat OS 270
10 Windows 10 Microsoft OS 258
11 Windows Server 2016 Microsoft OS 243
12 Linux Kernel Linux OS 178
13 Enterprise Linux Redhat OS 169
14 Windows 8.1 Microsoft OS 165
15 Windows Server 2012 Microsoft OS 164
16 Windows 7 Microsoft OS 163
17 Thunderbird Mozilla Application 162
18 Chrome Google Application 160
19 Firefox Esr Mozilla Application 157
20 Windows Server 2008 Microsoft OS 157
21 Enterprise Linux Server Tus Redhat OS 145
22 Windows Rt 8.1 Microsoft OS 139
23 Iphone Os Apple OS 125
24 Mac Os X Apple OS 110
25 Mysql Oracle Application 108
26 Intelligent Management Center HP Application 107
27 Foxit Reader Foxitsoftware Application 102
28 Phantompdf Foxitsoftware Application 99
29 Rational Quality Manager IBM Application 85
30 Storage Automation Store Netapp Application 84
31 Chakracore Microsoft Application 80
32 Wireshark Wireshark Application 79
33 Office Microsoft Application 76
34 Leap Opensuse OS 74
35 Snapcenter Netapp Application 71
36 Imagemagick Imagemagick Application 71
37 Fedora Fedoraproject OS 68
38 Big-ip Access Policy Manager F5 Application 67
39 Oncommand Insight Netapp Application 65
40 Watchos Apple OS 65
41 Oncommand Workflow Automation Netapp Application 64
42 Big-ip Advanced Firewall Manager F5 Application 60
43 Tvos Apple OS 59
44 Big-ip Policy Enforcement Manager F5 Application 59
45 Rational Collaborative Lifecycle Management IBM Application 59
46 Big-ip Local Traffic Manager F5 Application 58
47 Jenkins Jenkins Application 57
48 Big-ip Application Acceleration Manager F5 Application 57
49 JRE Oracle Application 56
50 JDK Oracle Application 56
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
1349
838
769
2467
610
1445
178
359
220
107
201
144
284
79
74
71
68
301
57
 
Debian 1349
Canonical 838
Google 769
Redhat 2467
Mozilla 610
Microsoft 1445
Linux 178
Apple 359
Oracle 220
HP 107
Foxitsoftware 201
IBM 144
Netapp 284
Wireshark 79
Opensuse 74
Imagemagick 71
Fedoraproject 68
F5 301
Jenkins 57
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.