Products with the Most Security Vulnerabilties Number of distinct CVEs since 2018

Debian Linux 3074 vulnerabilities
OS

Microsoft Windows 10 1941 vulnerabilities

Microsoft Windows Server 2016 1916 vulnerabilities

Google Android 1888 vulnerabilities
Mobile operating system

Canonical Ubuntu Linux 1835 vulnerabilities
Linux Operating System

Fedora Project Fedora 1683 vulnerabilities

Microsoft Windows Server 2019 1640 vulnerabilities

Microsoft Windows Server 2012 1218 vulnerabilities

Microsoft Windows 8.1 1181 vulnerabilities

Google Chrome 1164 vulnerabilities
Web browser

Microsoft Windows Rt 8 1 1125 vulnerabilities

Microsoft Windows Server 2008 1108 vulnerabilities

Microsoft Windows 7 1100 vulnerabilities

Linux Kernel 1017 vulnerabilities

Apple iOS 976 vulnerabilities
The iOS Operating System used by iPhones.

Red Hat Enterprise Linux Server 890 vulnerabilities
RedHat Enterprise Linux (RHEL) Server. Includes software bundeled with RHEL server.

Apple Mac OSX 878 vulnerabilities
Macintosh Operating System

Red Hat Enterprise Linux Workstation 870 vulnerabilities
RedHat Enterprise Linux (RHEL) Workstation. Includes software bundled with RHEL Workstation.

Red Hat Enterprise Linux Desktop 857 vulnerabilities
RedHat Enterprise Linux (RHEL) Desktop. Includes software bundled with RHEL desktop

OpenSuse Leap 791 vulnerabilities

Apple TV OS 627 vulnerabilities
Apple TV Operating System

Mozilla Firefox 608 vulnerabilities
Open source web browser

Apple Watch OS 583 vulnerabilities
Apple Watch Operating System

GitLab 550 vulnerabilities
Version Control Server and CI/CD Platform

Red Hat Enterprise Linux (RHEL) 493 vulnerabilities

Oracle MySQL 472 vulnerabilities
Open Source Database Engine

Microsoft Internet Explorer (IE) 409 vulnerabilities
Popular web browser for windows

Oracle Java Runtime Environment (JRE) 398 vulnerabilities
The runtime that executes java bytecode

Oracle Java Development Kit (JDK) 387 vulnerabilities
Compilers, tool and runtime for java

Mozilla Thunderbird 374 vulnerabilities
Email client

OpenSuse 366 vulnerabilities

Apple Macos 332 vulnerabilities

Apple Safari 330 vulnerabilities

Apple iPad OS 299 vulnerabilities
Apple iPad Operating System

Microsoft Office 259 vulnerabilities

Suse Linux Enterprise Server 256 vulnerabilities

ImageMagick 250 vulnerabilities

Suse Linux Enterprise Desktop 238 vulnerabilities

F5 Networks Big Ip Analytics 237 vulnerabilities

Red Hat Enterprise Linux Eus 226 vulnerabilities

Oracle VM VirtualBox 220 vulnerabilities

Microsoft Sharepoint Server 217 vulnerabilities

Google Tensorflow 209 vulnerabilities
Open source machine learning / AI library

Magento 200 vulnerabilities

Apple iTunes 198 vulnerabilities
Apple iTunes Software

NetApp Oncommand Insight 192 vulnerabilities

Microsoft ChakraCore 183 vulnerabilities
ChakraCore is the core part of the Chakra JavaScript engine that powers Microsoft Edge

Apache HTTP Server 182 vulnerabilities

Apple iPad OS 182 vulnerabilities
Apple iPad Operating System

cPanel 178 vulnerabilities

HP Intelligent Management Center 175 vulnerabilities

Foxit Software Phantompdf 173 vulnerabilities

NetApp Snapcenter 173 vulnerabilities

Apple iCloud 173 vulnerabilities

Mozilla SeaMonkey 171 vulnerabilities
Browser, email and newsgroup client

QEMU 166 vulnerabilities
QEMU is a generic and open source machine emulator and virtualizer.

OpenSuse Backports Sle 164 vulnerabilities

Microsoft Sharepoint Foundation 151 vulnerabilities

Oracle Weblogic Server 150 vulnerabilities
Java EE server

Cisco IOS XE 145 vulnerabilities
Newer version of Cisco IOS Operating System built on linux.

Microsoft Ie 145 vulnerabilities

Juniper Networks Junos 140 vulnerabilities

F5 Networks Big Ip Edge Gateway 136 vulnerabilities

F5 Networks Big Ip Webaccelerator 136 vulnerabilities

Atlassian Jira 136 vulnerabilities

Oracle Solaris 134 vulnerabilities

Wireshark 127 vulnerabilities

Gpac 126 vulnerabilities

Foxit Software Foxit Reader 123 vulnerabilities

Joomla 123 vulnerabilities

NetApp Storage Automation Store 120 vulnerabilities

Oracle Outside In Technology 120 vulnerabilities

Red Hat Openstack 116 vulnerabilities

Chadhaajay Phpkb 116 vulnerabilities

Citrix Xen Xen 114 vulnerabilities

FFmpeg 112 vulnerabilities

Mozilla Thunderbird Esr 106 vulnerabilities

NetApp Active Iq Unified Manager 103 vulnerabilities

FreeBSD 98 vulnerabilities
Unix OS

Cisco Firepower Threat Defense 97 vulnerabilities

Suse Linux Enterprise Server 95 vulnerabilities

IBM Rational Quality Manager 92 vulnerabilities

Microsoft Excel 91 vulnerabilities
Spreadsheet Software

MediaWiki 88 vulnerabilities
Wiki Platform

Cisco Internetwork Operating System (IOS) 84 vulnerabilities
Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches.

Jenkins 84 vulnerabilities
Continuous Integration Engine

Palo Alto Networks PAN-OS 84 vulnerabilities
PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.

Microsoft 365 Apps 84 vulnerabilities

Microsoft Office 365 Proplus 83 vulnerabilities

NetApp Solidfire 80 vulnerabilities

NetApp Clustered Data Ontap 80 vulnerabilities

GNU Binutils 78 vulnerabilities

Oracle Jrockit 78 vulnerabilities

 

Cybozu Garoon 77 vulnerabilities

Exiv2 77 vulnerabilities

Red Hat Virtualization 76 vulnerabilities

NetApp Hci Management Node 76 vulnerabilities

Microsoft Office Online Server 74 vulnerabilities

CMS Made Simple 74 vulnerabilities

Moodle 73 vulnerabilities

Nagios Xi 73 vulnerabilities

Microsoft Windows Server 2022 72 vulnerabilities

PHP 71 vulnerabilities
Web programming language

WordPress 71 vulnerabilities
Blog Platform

Microsoft Exchange Server 70 vulnerabilities

Siemens Jt2go 70 vulnerabilities

Red Hat Enterprise Mrg 69 vulnerabilities

Adobe Experience Manager 69 vulnerabilities
Adobe Experience Manager (AEM), is a comprehensive content management solution for building websites, mobile apps and forms

Uclouvain Openjpeg 69 vulnerabilities

Huawei Emui 67 vulnerabilities

Open Emr Openemr 66 vulnerabilities

Huawei Magic Ui 66 vulnerabilities

Axiosys Bento4 66 vulnerabilities

JetBrains Teamcity 65 vulnerabilities

Red Hat Satellite 64 vulnerabilities

FasterXML Jackson Databind 64 vulnerabilities
The jackson-databind java library for JSON parsing.

Red Hat Ansible Tower 63 vulnerabilities

IBM Api Connect 63 vulnerabilities

Cisco Webex Meetings Server 63 vulnerabilities

GNU Libredwg 62 vulnerabilities

Webkitgtk 60 vulnerabilities

Adobe ColdFusion 59 vulnerabilities
Web application server since 1995. Tag or script based programming language CFML.

Oracle Database Server 58 vulnerabilities
Oracle Database Server

 

Advantech Webaccess 58 vulnerabilities

Suse Linux Enterprise Desktop 57 vulnerabilities

Oracle Linux 56 vulnerabilities

Adobe Acrobat Dc 56 vulnerabilities

Adobe Acrobat Reader Dc 56 vulnerabilities

Microsoft Word 55 vulnerabilities

IBM Sterling B2b Integrator 55 vulnerabilities

Microsoft Visual Studio 2017 54 vulnerabilities

Microsoft Visual Studio 2019 54 vulnerabilities

Open Xchange Appsuite 54 vulnerabilities

Mikrotik Routeros 53 vulnerabilities

NetApp Snapmanager 53 vulnerabilities

Nextcloud Server 53 vulnerabilities

Microsoft Windows Server 52 vulnerabilities

VMware Workstation 52 vulnerabilities

Quest Software Disk Backup 52 vulnerabilities

Synology Diskstation Manager 51 vulnerabilities

Cisco Webex Meetings Online 51 vulnerabilities

Freetype 51 vulnerabilities

libming Ming 51 vulnerabilities
Ming is a library for generating Macromedia Flash files (.swf), written in C

Ntp 51 vulnerabilities

Drupal 50 vulnerabilities
CMS

Intel Graphics Driver 50 vulnerabilities

FreeRDP 50 vulnerabilities

SAP 3d Visual Enterprise Viewer 49 vulnerabilities

Cisco Identity Services Engine 49 vulnerabilities

Zzcms 49 vulnerabilities

Foxit Software Reader 49 vulnerabilities

Otrs 49 vulnerabilities

Dolibarr 48 vulnerabilities

VMware Cloud Foundation 48 vulnerabilities

Microsoft Office Web Apps 47 vulnerabilities

 

IBM Rational Team Concert 47 vulnerabilities

JetBrains Youtrack 47 vulnerabilities

Liferay Portal 47 vulnerabilities

Cisco Sd Wan Vmanage 46 vulnerabilities

VMware Esxi 46 vulnerabilities

Atlassian Data Center 46 vulnerabilities

Red Hat Keycloak 45 vulnerabilities

Red Hat Linux Workstation 45 vulnerabilities

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.