Products with the Most Security Vulnerabilties Number of distinct CVEs since 2018

Debian Linux 3491 vulnerabilities
OS

Fedora Project Fedora 2118 vulnerabilities

Google Android 2106 vulnerabilities
Mobile operating system

Microsoft Windows 10 2072 vulnerabilities

Microsoft Windows Server 2016 2026 vulnerabilities

Canonical Ubuntu Linux 1935 vulnerabilities
Linux Operating System

Microsoft Windows Server 2019 1770 vulnerabilities

Microsoft Windows Server 2012 1306 vulnerabilities

Microsoft Windows 8.1 1261 vulnerabilities

Google Chrome 1212 vulnerabilities
Web browser

Microsoft Windows Rt 8 1 1179 vulnerabilities

Microsoft Windows Server 2008 1174 vulnerabilities

Microsoft Windows 7 1162 vulnerabilities

Apple iOS 1091 vulnerabilities
The iOS Operating System used by iPhones.

Linux Kernel 1046 vulnerabilities

Apple Mac OSX 960 vulnerabilities
Macintosh Operating System

Red Hat Enterprise Linux Server 914 vulnerabilities
RedHat Enterprise Linux (RHEL) Server. Includes software bundeled with RHEL server.

Red Hat Enterprise Linux Workstation 897 vulnerabilities
RedHat Enterprise Linux (RHEL) Workstation. Includes software bundled with RHEL Workstation.

Red Hat Enterprise Linux Desktop 885 vulnerabilities
RedHat Enterprise Linux (RHEL) Desktop. Includes software bundled with RHEL desktop

OpenSuse Leap 859 vulnerabilities

Apple TV OS 694 vulnerabilities
Apple TV Operating System

Apple Watch OS 656 vulnerabilities
Apple Watch Operating System

Mozilla Firefox 640 vulnerabilities
Open source web browser

GitLab 588 vulnerabilities
Version Control Server and CI/CD Platform

Red Hat Enterprise Linux (RHEL) 521 vulnerabilities

Oracle MySQL 515 vulnerabilities
Open Source Database Engine

Apple Macos 463 vulnerabilities

OpenSuse 405 vulnerabilities

Microsoft Internet Explorer (IE) 403 vulnerabilities
Popular web browser for windows

Mozilla Thunderbird 401 vulnerabilities
Email client

Oracle Java Runtime Environment (JRE) 401 vulnerabilities
The runtime that executes java bytecode

Oracle Java Development Kit (JDK) 390 vulnerabilities
Compilers, tool and runtime for java

NetApp Oncommand Insight 380 vulnerabilities

Apple iPad OS 358 vulnerabilities
Apple iPad Operating System

Apple Safari 347 vulnerabilities

NetApp Snapcenter 316 vulnerabilities

Suse Linux Enterprise Desktop 274 vulnerabilities

Microsoft Office 271 vulnerabilities

Suse Linux Enterprise Server 257 vulnerabilities

ImageMagick 250 vulnerabilities

Red Hat Enterprise Linux Eus 245 vulnerabilities

Google Tensorflow 243 vulnerabilities
Open source machine learning / AI library

F5 Networks Big Ip Analytics 238 vulnerabilities

Apple iPad OS 228 vulnerabilities
Apple iPad Operating System

Oracle VM VirtualBox 224 vulnerabilities

Microsoft Sharepoint Server 224 vulnerabilities

NetApp Active Iq Unified Manager 217 vulnerabilities

Apple iTunes 202 vulnerabilities
Apple iTunes Software

Magento 200 vulnerabilities

Apache HTTP Server 184 vulnerabilities

Gpac 184 vulnerabilities

Microsoft ChakraCore 183 vulnerabilities
ChakraCore is the core part of the Chakra JavaScript engine that powers Microsoft Edge

Huawei Harmonyos 182 vulnerabilities

cPanel 178 vulnerabilities

OpenSuse Backports Sle 177 vulnerabilities

HP Intelligent Management Center 175 vulnerabilities

Apple iCloud 174 vulnerabilities

Foxit Software Phantompdf 173 vulnerabilities

Mozilla SeaMonkey 171 vulnerabilities
Browser, email and newsgroup client

QEMU 170 vulnerabilities
QEMU is a generic and open source machine emulator and virtualizer.

Microsoft Windows Server 165 vulnerabilities

Oracle Weblogic Server 165 vulnerabilities
Java EE server

Huawei Emui 165 vulnerabilities

Huawei Magic Ui 164 vulnerabilities

Juniper Networks Junos 157 vulnerabilities

Microsoft Sharepoint Foundation 155 vulnerabilities

Atlassian Jira 146 vulnerabilities

Microsoft Windows 11 146 vulnerabilities

Cisco IOS XE 146 vulnerabilities
Newer version of Cisco IOS Operating System built on linux.

Wireshark 143 vulnerabilities

Oracle Solaris 140 vulnerabilities

F5 Networks Big Ip Webaccelerator 137 vulnerabilities

F5 Networks Big Ip Edge Gateway 137 vulnerabilities

Microsoft Ie 134 vulnerabilities

Oracle Outside In Technology 133 vulnerabilities

Citrix Xen Xen 127 vulnerabilities

Foxit Software Foxit Reader 123 vulnerabilities

Joomla 123 vulnerabilities

Cisco Firepower Threat Defense 120 vulnerabilities

NetApp Storage Automation Store 120 vulnerabilities

Red Hat Openstack 118 vulnerabilities

Chadhaajay Phpkb 116 vulnerabilities

FFmpeg 113 vulnerabilities

NetApp Solidfire 107 vulnerabilities

Mozilla Thunderbird Esr 106 vulnerabilities

FreeBSD 105 vulnerabilities
Unix OS

NetApp Hci Management Node 102 vulnerabilities

MediaWiki 100 vulnerabilities
Wiki Platform

Microsoft Windows Server 2022 99 vulnerabilities

Jenkins 98 vulnerabilities
Continuous Integration Engine

Suse Linux Enterprise Server 96 vulnerabilities

Microsoft Excel 95 vulnerabilities
Spreadsheet Software

NetApp Clustered Data Ontap 94 vulnerabilities

Microsoft 365 Apps 94 vulnerabilities

IBM Rational Quality Manager 92 vulnerabilities

Palo Alto Networks PAN-OS 91 vulnerabilities
PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.

SAP 3d Visual Enterprise Viewer 90 vulnerabilities

Siemens Jt2go 86 vulnerabilities

Cisco Internetwork Operating System (IOS) 85 vulnerabilities
Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches.

NetApp Snapmanager 84 vulnerabilities

Microsoft Office 365 Proplus 83 vulnerabilities

GNU Binutils 79 vulnerabilities

Adobe Experience Manager 78 vulnerabilities
Adobe Experience Manager (AEM), is a comprehensive content management solution for building websites, mobile apps and forms

Oracle Jrockit 78 vulnerabilities

Exiv2 77 vulnerabilities

Microsoft Office Online Server 77 vulnerabilities

 

Cybozu Garoon 77 vulnerabilities

Moodle 77 vulnerabilities

Bentley Microstation 76 vulnerabilities

Bentley View 76 vulnerabilities

Microsoft Exchange Server 76 vulnerabilities

WordPress 76 vulnerabilities
Blog Platform

Nagios Xi 76 vulnerabilities

CMS Made Simple 74 vulnerabilities

JetBrains Teamcity 74 vulnerabilities

PHP 73 vulnerabilities
Web programming language

Uclouvain Openjpeg 70 vulnerabilities

Red Hat Enterprise Mrg 69 vulnerabilities

Red Hat Satellite 68 vulnerabilities

Open Emr Openemr 67 vulnerabilities

Red Hat Virtualization 66 vulnerabilities

Axiosys Bento4 66 vulnerabilities

Webkitgtk 65 vulnerabilities

GNU Libredwg 65 vulnerabilities

Red Hat Ansible Tower 64 vulnerabilities

FasterXML Jackson Databind 64 vulnerabilities
The jackson-databind java library for JSON parsing.

Cisco Webex Meetings Server 64 vulnerabilities

IBM Api Connect 63 vulnerabilities

Oracle Linux 61 vulnerabilities

Oracle Database Server 60 vulnerabilities
Oracle Database Server

Oracle Primavera Unifier 59 vulnerabilities

Adobe ColdFusion 59 vulnerabilities
Web application server since 1995. Tag or script based programming language CFML.

 

Advantech Webaccess 58 vulnerabilities

Oracle Graalvm 58 vulnerabilities

Microsoft Visual Studio 2019 57 vulnerabilities

Adobe Acrobat Dc 57 vulnerabilities

Suse Linux Enterprise Desktop 57 vulnerabilities

Zzcms 56 vulnerabilities

Microsoft Word 56 vulnerabilities

Adobe Acrobat Reader Dc 56 vulnerabilities

Microsoft Visual Studio 2017 56 vulnerabilities

Oracle Banking Platform 56 vulnerabilities

Ntp 55 vulnerabilities

IBM Sterling B2b Integrator 55 vulnerabilities

Open Xchange Appsuite 54 vulnerabilities

Dolibarr 54 vulnerabilities

Nextcloud Server 54 vulnerabilities

libming Ming 53 vulnerabilities
Ming is a library for generating Macromedia Flash files (.swf), written in C

VMware Workstation 53 vulnerabilities

Cisco Identity Services Engine 53 vulnerabilities

Mikrotik Routeros 53 vulnerabilities

IBM Rational Team Concert 52 vulnerabilities

Drupal 52 vulnerabilities
CMS

FreeRDP 52 vulnerabilities

Quest Software Disk Backup 52 vulnerabilities

VMware Cloud Foundation 51 vulnerabilities

Atlassian Data Center 51 vulnerabilities

Synology Diskstation Manager 51 vulnerabilities

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.