Products with the Most Security Vulnerabilties Number of distinct CVEs since 2018

Debian Linux 5706 vulnerabilities
OS

Fedora Project Fedora 3771 vulnerabilities

Google Android 3005 vulnerabilities
Mobile operating system

Canonical Ubuntu Linux 2776 vulnerabilities
Linux Operating System

Microsoft Windows Server 2016 2554 vulnerabilities

Microsoft Windows 10 2542 vulnerabilities

Microsoft Windows Server 2019 2307 vulnerabilities

Microsoft Windows Server 2012 1726 vulnerabilities

Microsoft Windows 8.1 1641 vulnerabilities

Linux Kernel 1558 vulnerabilities

Microsoft Windows Server 2008 1525 vulnerabilities

Microsoft Windows Rt 8 1 1512 vulnerabilities

Google Chrome 1511 vulnerabilities
Web browser

Microsoft Windows 7 1497 vulnerabilities

Apple iOS 1389 vulnerabilities
The iOS Operating System used by iPhones.

OpenSuse Leap 1385 vulnerabilities

Red Hat Enterprise Linux Server 1353 vulnerabilities
RedHat Enterprise Linux (RHEL) Server. Includes software bundeled with RHEL server.

Red Hat Enterprise Linux Workstation 1335 vulnerabilities
RedHat Enterprise Linux (RHEL) Workstation. Includes software bundled with RHEL Workstation.

Red Hat Enterprise Linux Desktop 1314 vulnerabilities
RedHat Enterprise Linux (RHEL) Desktop. Includes software bundled with RHEL desktop

Apple Mac OSX 1120 vulnerabilities
Macintosh Operating System

Apple Macos 885 vulnerabilities

Red Hat Enterprise Linux (RHEL) 879 vulnerabilities

Apple TV OS 871 vulnerabilities
Apple TV Operating System

Oracle MySQL 853 vulnerabilities
Open Source Database Engine

Apple Watch OS 844 vulnerabilities
Apple Watch Operating System

Apple iPad OS 813 vulnerabilities
Apple iPad Operating System

NetApp Oncommand Insight 801 vulnerabilities

Mozilla Firefox 788 vulnerabilities
Open source web browser

GitLab 757 vulnerabilities
Version Control Server and CI/CD Platform

Oracle Java Runtime Environment (JRE) 642 vulnerabilities
The runtime that executes java bytecode

Red Hat Enterprise Linux Eus 639 vulnerabilities

Oracle Java Development Kit (JDK) 636 vulnerabilities
Compilers, tool and runtime for java

NetApp Active Iq Unified Manager 618 vulnerabilities

Microsoft Windows 11 601 vulnerabilities

Microsoft Windows Server 2022 586 vulnerabilities

OpenSuse 513 vulnerabilities

NetApp Snapcenter 511 vulnerabilities

Mozilla Thunderbird 509 vulnerabilities
Email client

Google Tensorflow 407 vulnerabilities
Open source machine learning / AI library

Microsoft Internet Explorer (IE) 400 vulnerabilities
Popular web browser for windows

Apple Safari 398 vulnerabilities

Huawei Emui 382 vulnerabilities

Huawei Harmonyos 381 vulnerabilities

MariaDB 356 vulnerabilities
Open source RDBMS forked from MySQL

Suse Linux Enterprise Desktop 348 vulnerabilities

Suse Linux Enterprise Server 342 vulnerabilities

NetApp Cloud Backup 320 vulnerabilities

Microsoft Office 318 vulnerabilities

OpenSuse Backports Sle 312 vulnerabilities

F5 Networks Big Ip Analytics 307 vulnerabilities

Microsoft Windows Server 280 vulnerabilities

Gpac 270 vulnerabilities

ImageMagick 269 vulnerabilities

Huawei Magic Ui 268 vulnerabilities

Oracle VM VirtualBox 254 vulnerabilities

Microsoft Sharepoint Server 254 vulnerabilities

Oracle Solaris 243 vulnerabilities

Apple iTunes 226 vulnerabilities
Apple iTunes Software

Oracle Weblogic Server 222 vulnerabilities
Java EE server

QEMU 216 vulnerabilities
QEMU is a generic and open source machine emulator and virtualizer.

Juniper Networks Junos 209 vulnerabilities

Magento 209 vulnerabilities

Apache HTTP Server 206 vulnerabilities

Apple iCloud 194 vulnerabilities

Citrix Xen Xen 184 vulnerabilities

Microsoft ChakraCore 184 vulnerabilities
ChakraCore is the core part of the Chakra JavaScript engine that powers Microsoft Edge

Bentley Microstation 181 vulnerabilities

PHP 179 vulnerabilities
Web programming language

cPanel 178 vulnerabilities

NetApp Snapmanager 177 vulnerabilities

NetApp Solidfire 176 vulnerabilities

Microsoft Sharepoint Foundation 175 vulnerabilities

HP Intelligent Management Center 175 vulnerabilities

Sun Jre 174 vulnerabilities

Foxit Software Phantompdf 173 vulnerabilities

Mozilla SeaMonkey 172 vulnerabilities
Browser, email and newsgroup client

Red Hat Satellite 171 vulnerabilities

Cisco IOS XE 169 vulnerabilities
Newer version of Cisco IOS Operating System built on linux.

NetApp Hci Management Node 169 vulnerabilities

Red Hat Openstack 167 vulnerabilities

Sun Jdk 164 vulnerabilities

Wireshark 163 vulnerabilities

NetApp Clustered Data Ontap 148 vulnerabilities

Microsoft 365 Apps 146 vulnerabilities

Oracle Outside In Technology 146 vulnerabilities

FFmpeg 144 vulnerabilities

NetApp Oncommand Unified Manager 144 vulnerabilities

F5 Networks Big Ip Edge Gateway 143 vulnerabilities

Vim 143 vulnerabilities

F5 Networks Big Ip Webaccelerator 143 vulnerabilities

Cisco Firepower Threat Defense 143 vulnerabilities

Joomla 136 vulnerabilities

MediaWiki 135 vulnerabilities
Wiki Platform

Microsoft Ie 132 vulnerabilities

Atlassian Jira Server 130 vulnerabilities

SAP 3d Visual Enterprise Viewer 127 vulnerabilities

Adobe Experience Manager 125 vulnerabilities
Adobe Experience Manager (AEM), is a comprehensive content management solution for building websites, mobile apps and forms

FreeBSD 125 vulnerabilities
Unix OS

Foxit Software Foxit Reader 124 vulnerabilities

Axiosys Bento4 124 vulnerabilities

Moodle 123 vulnerabilities

Siemens Teamcenter Visualization 122 vulnerabilities

Chadhaajay Phpkb 118 vulnerabilities

Cisco Internetwork Operating System (IOS) 118 vulnerabilities
Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches.

OpenSSL 118 vulnerabilities
Popular Crypto Implementation Library

Siemens Jt2go 118 vulnerabilities

Jenkins 116 vulnerabilities
Continuous Integration Engine

Atlassian Jira 115 vulnerabilities

Oracle Mysql Server 115 vulnerabilities

Oracle Graalvm 115 vulnerabilities

NetApp Storage Automation Store 110 vulnerabilities

Cisco Firepower Management Center 108 vulnerabilities

Red Hat Software Collections 108 vulnerabilities

Mozilla Thunderbird Esr 107 vulnerabilities

Microsoft Excel 106 vulnerabilities
Spreadsheet Software

Bentley View 105 vulnerabilities

nodejs node.js 105 vulnerabilities

Samba 105 vulnerabilities

JetBrains Teamcity 103 vulnerabilities

Oracle Linux 102 vulnerabilities

Open Emr Openemr 101 vulnerabilities

Microsoft Exchange Server 99 vulnerabilities

Palo Alto Networks PAN-OS 98 vulnerabilities
PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.

Suse Linux Enterprise Server 98 vulnerabilities

Liferay Portal 96 vulnerabilities

 

Cybozu Garoon 96 vulnerabilities

IBM Rational Quality Manager 93 vulnerabilities

Nextcloud Server 93 vulnerabilities

Oracle Primavera Unifier 91 vulnerabilities

Radare2 91 vulnerabilities

IBM Aix 90 vulnerabilities

Oracle Jrockit 90 vulnerabilities

Microsoft Office Online Server 89 vulnerabilities

Otfccproject Otfcc 88 vulnerabilities

OpenSuse Backports 88 vulnerabilities

Oracle Webcenter Portal 87 vulnerabilities

Nagios Xi 86 vulnerabilities

NetApp Element Software 85 vulnerabilities

Exiv2 84 vulnerabilities

Microsoft Office 365 Proplus 83 vulnerabilities

WordPress 82 vulnerabilities
Blog Platform

GNU Binutils 80 vulnerabilities

Control Webpanel Webpanel 80 vulnerabilities

Bentley Microstation Connect 78 vulnerabilities

CMS Made Simple 78 vulnerabilities

GNU Libredwg 77 vulnerabilities

Webkitgtk 77 vulnerabilities

Bentley View 76 vulnerabilities

Microweber 76 vulnerabilities

Red Hat Virtualization 76 vulnerabilities

Zzcms 76 vulnerabilities

Glpi Project Glpi 76 vulnerabilities

Microsoft Visual Studio 2019 74 vulnerabilities

Oracle Http Server 74 vulnerabilities

Atlassian Jira Data Center 74 vulnerabilities

Microsoft Edge Chromium 74 vulnerabilities

VMware Cloud Foundation 74 vulnerabilities

Drupal 74 vulnerabilities
CMS

Swftools 73 vulnerabilities

Adobe ColdFusion 73 vulnerabilities
Web application server since 1995. Tag or script based programming language CFML.

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.