CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2018

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Debian Linux Debian OS 1413
2 Ubuntu Linux Canonical OS 877
3 Android Google OS 609
4 Enterprise Linux Server Redhat OS 592
5 Enterprise Linux Workstation Redhat OS 573
6 Enterprise Linux Desktop Redhat OS 564
7 Enterprise Linux Server Aus Redhat OS 297
8 Firefox Mozilla Application 291
9 Enterprise Linux Server Eus Redhat OS 281
10 Windows 10 Microsoft OS 259
11 Windows Server 2016 Microsoft OS 244
12 Linux Kernel Linux OS 180
13 Enterprise Linux Server Tus Redhat OS 171
14 Enterprise Linux Redhat OS 171
15 Windows 8.1 Microsoft OS 166
16 Windows Server 2012 Microsoft OS 165
17 Windows 7 Microsoft OS 164
18 Thunderbird Mozilla Application 162
19 Chrome Google Application 160
20 Windows Server 2008 Microsoft OS 158
21 Firefox Esr Mozilla Application 157
22 Windows Rt 8.1 Microsoft OS 140
23 Iphone Os Apple OS 125
24 Mac Os X Apple OS 110
25 Mysql Oracle Application 108
26 Intelligent Management Center HP Application 107
27 Foxit Reader Foxitsoftware Application 102
28 Leap Opensuse OS 101
29 Phantompdf Foxitsoftware Application 99
30 Oncommand Insight Netapp Application 98
31 Oncommand Workflow Automation Netapp Application 98
32 Snapcenter Netapp Application 94
33 Rational Quality Manager IBM Application 85
34 Fedora Fedoraproject OS 82
35 Chakracore Microsoft Application 80
36 Wireshark Wireshark Application 79
37 Office Microsoft Application 76
38 Storage Automation Store Netapp Application 74
39 Imagemagick Imagemagick Application 71
40 Big-ip Access Policy Manager F5 Application 69
41 Watchos Apple OS 65
42 Satellite Redhat Application 64
43 Big-ip Advanced Firewall Manager F5 Application 62
44 Big-ip Policy Enforcement Manager F5 Application 61
45 Big-ip Local Traffic Manager F5 Application 60
46 Rational Collaborative Lifecycle Management IBM Application 59
47 Big-ip Application Acceleration Manager F5 Application 59
48 Tvos Apple OS 59
49 Openstack Redhat Application 57
50 Jenkins Jenkins Application 57
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
1413
877
769
2770
610
1452
180
359
108
107
201
101
364
144
82
79
71
311
57
 
Debian 1413
Canonical 877
Google 769
Redhat 2770
Mozilla 610
Microsoft 1452
Linux 180
Apple 359
Oracle 108
HP 107
Foxitsoftware 201
Opensuse 101
Netapp 364
IBM 144
Fedoraproject 82
Wireshark 79
Imagemagick 71
F5 311
Jenkins 57
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.