CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Top 50 Products By Total Number Of "Distinct" Vulnerabilities in 2019

Product Name Vendor Name Product Type Number of Vulnerabilities
1 Debian Linux Debian OS 887
2 Fedora Fedoraproject OS 494
3 Android Google OS 491
4 Ubuntu Linux Canonical OS 465
5 Leap Opensuse OS 451
6 Windows 10 Microsoft OS 448
7 Windows Server 2016 Microsoft OS 443
8 Windows Server 2019 Microsoft OS 433
9 Iphone Os Apple OS 356
10 Cpanel Cpanel Application 321
11 Windows 7 Microsoft OS 321
12 Windows Server 2012 Microsoft OS 314
13 Windows Server 2008 Microsoft OS 314
14 Chrome Google Application 312
15 Windows 8.1 Microsoft OS 310
16 Mac Os X Apple OS 306
17 Windows Rt 8.1 Microsoft OS 296
18 Linux Kernel Linux OS 290
19 Tvos Apple OS 252
20 Enterprise Linux Server Redhat OS 236
21 Enterprise Linux Workstation Redhat OS 227
22 Enterprise Linux Desktop Redhat OS 222
23 Enterprise Linux Redhat OS 210
24 Watchos Apple OS 202
25 Safari Apple Application 166
26 Gitlab Gitlab Application 164
27 Mysql Oracle Application 140
28 Magento Magento Application 137
29 Firefox Mozilla Application 114
30 Intelligent Management Center HP Application 104
31 Enterprise Linux Server Aus Redhat OS 96
32 Big-ip Access Policy Manager F5 Application 95
33 Big-ip Application Security Manager F5 Application 93
34 Itunes Apple Application 92
35 Icloud Apple Application 92
36 Big-ip Advanced Firewall Manager F5 Application 90
37 Enterprise Linux Server Tus Redhat OS 90
38 Big-ip Local Traffic Manager F5 Application 89
39 Big-ip Policy Enforcement Manager F5 Application 87
40 Big-ip Application Acceleration Manager F5 Application 84
41 Big-ip Link Controller F5 Application 84
42 Big-ip Analytics F5 Application 83
43 Big-ip Global Traffic Manager F5 Application 82
44 Big-ip Fraud Protection Service F5 Application 77
45 Big-ip Webaccelerator F5 Application 77
46 Big-ip Domain Name System F5 Application 76
47 Big-ip Edge Gateway F5 Application 75
48 Chakracore Microsoft Application 71
49 Openshift Container Platform Redhat Application 71
50 Imagemagick Imagemagick Application 65
Total Number Of Vulnerabilities Of Top 50 Products By Vendor
887
494
803
465
451
2950
1466
321
290
1152
164
140
137
114
104
1092
65
 
Debian 887
Fedoraproject 494
Google 803
Canonical 465
Opensuse 451
Microsoft 2950
Apple 1466
Cpanel 321
Linux 290
Redhat 1152
Gitlab 164
Oracle 140
Magento 137
Mozilla 114
HP 104
F5 1092
Imagemagick 65
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.