Products with the Most Security Vulnerabilties Number of distinct CVEs since 2018

Debian Linux 2704 vulnerabilities
OS

Canonical Ubuntu Linux 1752 vulnerabilities
Linux Operating System

Microsoft Windows 10 1732 vulnerabilities

Microsoft Windows Server 2016 1701 vulnerabilities

Google Android 1668 vulnerabilities
Mobile operating system

Microsoft Windows Server 2019 1435 vulnerabilities

Fedora Project Fedora 1239 vulnerabilities

Microsoft Windows Server 2012 1070 vulnerabilities

Microsoft Windows 8.1 1050 vulnerabilities

Google Chrome 1026 vulnerabilities
Web browser

Microsoft Windows Rt 8 1 997 vulnerabilities

Microsoft Windows 7 993 vulnerabilities

Microsoft Windows Server 2008 983 vulnerabilities

Linux Kernel 913 vulnerabilities

Apple iOS 809 vulnerabilities
The iOS Operating System used by iPhones.

Red Hat Enterprise Linux Server 808 vulnerabilities
RedHat Enterprise Linux (RHEL) Server. Includes software bundeled with RHEL server.

Red Hat Enterprise Linux Workstation 787 vulnerabilities
RedHat Enterprise Linux (RHEL) Workstation. Includes software bundled with RHEL Workstation.

Red Hat Enterprise Linux Desktop 773 vulnerabilities
RedHat Enterprise Linux (RHEL) Desktop. Includes software bundled with RHEL desktop

Apple Mac OSX 747 vulnerabilities
Macintosh Operating System

OpenSuse Leap 721 vulnerabilities

Mozilla Firefox 557 vulnerabilities
Open source web browser

Apple TV OS 533 vulnerabilities
Apple TV Operating System

Apple Watch OS 484 vulnerabilities
Apple Watch Operating System

GitLab 470 vulnerabilities
Version Control Server and CI/CD Platform

Oracle MySQL 466 vulnerabilities
Open Source Database Engine

Oracle Java Runtime Environment (JRE) 397 vulnerabilities
The runtime that executes java bytecode

Red Hat Enterprise Linux (RHEL) 397 vulnerabilities

Oracle Java Development Kit (JDK) 383 vulnerabilities
Compilers, tool and runtime for java

Mozilla Thunderbird 347 vulnerabilities
Email client

OpenSuse 346 vulnerabilities

Apple Safari 310 vulnerabilities

Suse Linux Enterprise Server 247 vulnerabilities

ImageMagick 247 vulnerabilities

Microsoft Office 229 vulnerabilities

Suse Linux Enterprise Desktop 228 vulnerabilities

Oracle VM VirtualBox 216 vulnerabilities

F5 Networks Big Ip Analytics 213 vulnerabilities

Red Hat Enterprise Linux Eus 213 vulnerabilities

Magento 193 vulnerabilities

Apple iPad OS 192 vulnerabilities
Apple iPad Operating System

Apple iTunes 192 vulnerabilities
Apple iTunes Software

Microsoft Sharepoint Server 187 vulnerabilities

Microsoft ChakraCore 183 vulnerabilities
ChakraCore is the core part of the Chakra JavaScript engine that powers Microsoft Edge

HP Intelligent Management Center 175 vulnerabilities

cPanel 171 vulnerabilities

Mozilla SeaMonkey 169 vulnerabilities
Browser, email and newsgroup client

Apple iCloud 167 vulnerabilities

Apache HTTP Server 167 vulnerabilities

Foxit Software Phantompdf 163 vulnerabilities

NetApp Snapcenter 158 vulnerabilities

OpenSuse Backports Sle 157 vulnerabilities

Apple iPad OS 156 vulnerabilities
Apple iPad Operating System

NetApp Oncommand Insight 146 vulnerabilities

Oracle Weblogic Server 142 vulnerabilities
Java EE server

Cisco IOS XE 137 vulnerabilities
Newer version of Cisco IOS Operating System built on linux.

F5 Networks Big Ip Edge Gateway 136 vulnerabilities

F5 Networks Big Ip Webaccelerator 136 vulnerabilities

Juniper Networks Junos 131 vulnerabilities

QEMU 128 vulnerabilities
QEMU is a generic and open source machine emulator and virtualizer.

Microsoft Sharepoint Foundation 126 vulnerabilities

Wireshark 125 vulnerabilities

Oracle Solaris 125 vulnerabilities

Apple Macos 124 vulnerabilities

NetApp Storage Automation Store 120 vulnerabilities

Chadhaajay Phpkb 116 vulnerabilities

Atlassian Jira 113 vulnerabilities

Foxit Software Foxit Reader 112 vulnerabilities

Oracle Outside In Technology 109 vulnerabilities

Mozilla Thunderbird Esr 106 vulnerabilities

Citrix Xen Xen 98 vulnerabilities

Joomla 97 vulnerabilities

Cisco Firepower Threat Defense 96 vulnerabilities

Suse Linux Enterprise Server 92 vulnerabilities

FreeBSD 89 vulnerabilities
Unix OS

Microsoft Office 365 Proplus 83 vulnerabilities

Red Hat Virtualization 82 vulnerabilities

Jenkins 82 vulnerabilities
Continuous Integration Engine

Microsoft Excel 80 vulnerabilities
Spreadsheet Software

Oracle Jrockit 77 vulnerabilities

IBM Rational Quality Manager 77 vulnerabilities

Cisco Internetwork Operating System (IOS) 77 vulnerabilities
Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches.

GNU Binutils 76 vulnerabilities

Palo Alto Networks PAN-OS 75 vulnerabilities
PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.

Red Hat Openstack 74 vulnerabilities

MediaWiki 68 vulnerabilities
Wiki Platform

PHP 68 vulnerabilities
Web programming language

Moodle 68 vulnerabilities

Uclouvain Openjpeg 66 vulnerabilities

FasterXML Jackson Databind 64 vulnerabilities
The jackson-databind java library for JSON parsing.

NetApp Clustered Data Ontap 63 vulnerabilities

Microsoft Office Online Server 63 vulnerabilities

WordPress 62 vulnerabilities
Blog Platform

Open Emr Openemr 62 vulnerabilities

Gpac 60 vulnerabilities

IBM Api Connect 59 vulnerabilities

CMS Made Simple 59 vulnerabilities

Adobe Experience Manager 59 vulnerabilities
Adobe Experience Manager (AEM), is a comprehensive content management solution for building websites, mobile apps and forms

Adobe ColdFusion 58 vulnerabilities
Web application server since 1995. Tag or script based programming language CFML.

Cisco Webex Meetings Server 58 vulnerabilities

Exiv2 57 vulnerabilities

Suse Linux Enterprise Desktop 57 vulnerabilities

JetBrains Teamcity 57 vulnerabilities

Oracle Database Server 57 vulnerabilities
Oracle Database Server

Microsoft Exchange Server 56 vulnerabilities

Red Hat Satellite 55 vulnerabilities

 

Advantech Webaccess 54 vulnerabilities

 

Cybozu Garoon 54 vulnerabilities

Microsoft 365 Apps 54 vulnerabilities

Nagios Xi 53 vulnerabilities

Red Hat Ansible Tower 52 vulnerabilities

 

Quest Software Disk Backup 52 vulnerabilities

Webkitgtk 51 vulnerabilities

Microsoft Word 51 vulnerabilities

NetApp Snapmanager 51 vulnerabilities

libming Ming 51 vulnerabilities
Ming is a library for generating Macromedia Flash files (.swf), written in C

Freetype 51 vulnerabilities

Open Xchange Appsuite 50 vulnerabilities

FFmpeg 50 vulnerabilities

Axiosys Bento4 50 vulnerabilities

FreeRDP 50 vulnerabilities

Intel Graphics Driver 50 vulnerabilities

Oracle Linux 50 vulnerabilities

Foxit Software Reader 49 vulnerabilities

VMware Workstation 48 vulnerabilities

Microsoft Visual Studio 2017 48 vulnerabilities

Microsoft Visual Studio 2019 46 vulnerabilities

Ntp 46 vulnerabilities

Cisco Webex Meetings Online 46 vulnerabilities

Red Hat Linux Desktop 45 vulnerabilities

Red Hat Linux Workstation 45 vulnerabilities

Red Hat Linux Server 45 vulnerabilities

Microsoft Office Web Apps 45 vulnerabilities

VMware Esxi 44 vulnerabilities

Hdfgroup Hdf5 44 vulnerabilities

Dolibarr 44 vulnerabilities

Red Hat Keycloak 43 vulnerabilities

IBM Rational Team Concert 43 vulnerabilities

PrestaShop 43 vulnerabilities

Zoneminder 43 vulnerabilities

NetApp Solidfire 43 vulnerabilities

Parallels Desktop 42 vulnerabilities

JetBrains Youtrack 41 vulnerabilities

Xpdfreader Xpdf 41 vulnerabilities

Zzcms 41 vulnerabilities

Oracle Primavera Unifier 41 vulnerabilities

 

Synology Diskstation Manager 41 vulnerabilities

Cisco Sd Wan Vmanage 41 vulnerabilities

Radare2 40 vulnerabilities

Adobe Acrobat Reader 40 vulnerabilities

Samba 40 vulnerabilities

Adobe Acrobat Reader Dc 39 vulnerabilities

Cisco Identity Services Engine 39 vulnerabilities

Adobe Acrobat Dc 39 vulnerabilities

Adobe Acrobat 39 vulnerabilities
Application for working with PDF documents

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.