CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2018

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Debian Linux Debian OS 1407
2 Ubuntu Linux Canonical OS 866
3 Android Google OS 609
4 Enterprise Linux Server Redhat OS 580
5 Enterprise Linux Workstation Redhat OS 561
6 Enterprise Linux Desktop Redhat OS 553
7 Enterprise Linux Server Aus Redhat OS 296
8 Firefox Mozilla Application 291
9 Enterprise Linux Server Eus Redhat OS 281
10 Windows 10 Microsoft OS 258
11 Windows Server 2016 Microsoft OS 243
12 Linux Kernel Linux OS 178
13 Enterprise Linux Redhat OS 170
14 Enterprise Linux Server Tus Redhat OS 170
15 Windows 8.1 Microsoft OS 165
16 Windows Server 2012 Microsoft OS 164
17 Windows 7 Microsoft OS 163
18 Thunderbird Mozilla Application 162
19 Chrome Google Application 160
20 Firefox Esr Mozilla Application 157
21 Windows Server 2008 Microsoft OS 157
22 Windows Rt 8.1 Microsoft OS 139
23 Iphone Os Apple OS 125
24 Mac Os X Apple OS 110
25 Mysql Oracle Application 108
26 Intelligent Management Center HP Application 107
27 Foxit Reader Foxitsoftware Application 102
28 Leap Opensuse OS 101
29 Phantompdf Foxitsoftware Application 99
30 Oncommand Insight Netapp Application 94
31 Oncommand Workflow Automation Netapp Application 94
32 Snapcenter Netapp Application 90
33 Rational Quality Manager IBM Application 85
34 Fedora Fedoraproject OS 81
35 Chakracore Microsoft Application 80
36 Wireshark Wireshark Application 79
37 Office Microsoft Application 76
38 Storage Automation Store Netapp Application 76
39 Imagemagick Imagemagick Application 71
40 Big-ip Access Policy Manager F5 Application 68
41 Watchos Apple OS 65
42 Satellite Redhat Application 64
43 Big-ip Advanced Firewall Manager F5 Application 61
44 Big-ip Policy Enforcement Manager F5 Application 60
45 Rational Collaborative Lifecycle Management IBM Application 59
46 Big-ip Local Traffic Manager F5 Application 59
47 Tvos Apple OS 59
48 Big-ip Application Acceleration Manager F5 Application 58
49 Openstack Redhat Application 57
50 Jenkins Jenkins Application 57
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
1407
866
769
2732
610
1445
178
359
108
107
201
101
354
144
81
79
71
306
57
 
Debian 1407
Canonical 866
Google 769
Redhat 2732
Mozilla 610
Microsoft 1445
Linux 178
Apple 359
Oracle 108
HP 107
Foxitsoftware 201
Opensuse 101
Netapp 354
IBM 144
Fedoraproject 81
Wireshark 79
Imagemagick 71
F5 306
Jenkins 57
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.