Products with the Most Security Vulnerabilties Number of distinct CVEs since 2018

Debian Linux 1966 vulnerabilities

Canonical Ubuntu Linux 1571 vulnerabilities
Linux Operating System

Microsoft Windows 10 1380 vulnerabilities

Microsoft Windows Server 2016 1350 vulnerabilities

Google Android 1281 vulnerabilities
Mobile operating system

Microsoft Windows Server 2019 1116 vulnerabilities

Microsoft Windows Server 2012 860 vulnerabilities

Microsoft Windows 8.1 853 vulnerabilities

Google Chrome 820 vulnerabilities
Web browser

Microsoft Windows 7 817 vulnerabilities

Microsoft Windows Rt 8 1 810 vulnerabilities

Linux Kernel 807 vulnerabilities

Microsoft Windows Server 2008 799 vulnerabilities

Red Hat Enterprise Linux Server 781 vulnerabilities
RedHat Enterprise Linux (RHEL) Server. Includes software bundeled with RHEL server.

Red Hat Enterprise Linux Workstation 754 vulnerabilities
RedHat Enterprise Linux (RHEL) Workstation. Includes software bundled with RHEL Workstation.

Red Hat Enterprise Linux Desktop 745 vulnerabilities
RedHat Enterprise Linux (RHEL) Desktop. Includes software bundled with RHEL desktop

Apple iOS 592 vulnerabilities
The iOS Operating System used by iPhones.

Fedora Project Fedora 566 vulnerabilities

Apple Mac OSX 498 vulnerabilities
Macintosh Operating System

Mozilla Firefox 469 vulnerabilities
Open source web browser

OpenSuse Leap 451 vulnerabilities

Oracle Java Runtime Environment (JRE) 385 vulnerabilities
The runtime that executes java bytecode

GitLab 381 vulnerabilities
Version Control Server and CI/CD Platform

Oracle Java Development Kit (JDK) 371 vulnerabilities
Compilers, tool and runtime for java

Apple TV OS 367 vulnerabilities
Apple TV Operating System

Oracle MySQL 330 vulnerabilities
Open Source Database Engine

Apple Watch OS 322 vulnerabilities
Apple Watch Operating System

Mozilla Thunderbird 307 vulnerabilities
Email client

OpenSuse 295 vulnerabilities

Red Hat Enterprise Linux (RHEL) 290 vulnerabilities

Apple Safari 276 vulnerabilities

Suse Linux Enterprise Server 227 vulnerabilities

Suse Linux Enterprise Desktop 216 vulnerabilities

Red Hat Enterprise Linux Eus 189 vulnerabilities

Microsoft ChakraCore 180 vulnerabilities
ChakraCore is the core part of the Chakra JavaScript engine that powers Microsoft Edge

Microsoft Office 177 vulnerabilities

ImageMagick 176 vulnerabilities

F5 Networks Big Ip Analytics 173 vulnerabilities

Magento 168 vulnerabilities

Oracle VM VirtualBox 168 vulnerabilities

Mozilla SeaMonkey 168 vulnerabilities
Browser, email and newsgroup client

Apple iTunes 157 vulnerabilities
Apple iTunes Software

Foxit Software Phantompdf 148 vulnerabilities

Microsoft Sharepoint Server 148 vulnerabilities

cPanel 147 vulnerabilities

F5 Networks Big Ip Edge Gateway 131 vulnerabilities

F5 Networks Big Ip Webaccelerator 130 vulnerabilities

Apple Icloud 124 vulnerabilities

NetApp Storage Automation Store 117 vulnerabilities

Chadhaajay Phpkb 116 vulnerabilities

Wireshark 111 vulnerabilities

HP Intelligent Management Center 111 vulnerabilities

Mozilla Thunderbird Esr 105 vulnerabilities

Oracle Solaris 104 vulnerabilities

QEMU 102 vulnerabilities
QEMU is a generic and open source machine emulator and virtualizer.

Cisco IOS XE 101 vulnerabilities
Newer version of Cisco IOS Operating System built on linux.

Foxit Software Foxit Reader 99 vulnerabilities

Oracle Outside In Technology 96 vulnerabilities

Microsoft Sharepoint Foundation 95 vulnerabilities

NetApp Snapcenter 95 vulnerabilities

Suse Linux Enterprise Server 92 vulnerabilities

Atlassian Jira 92 vulnerabilities

Apple iPad OS 91 vulnerabilities
Apple iPad Operating System

Oracle Weblogic Server 88 vulnerabilities
Java EE server

Juniper Networks Junos 87 vulnerabilities

Microsoft Office 365 Proplus 83 vulnerabilities

Red Hat Virtualization 82 vulnerabilities

Oracle Jrockit 77 vulnerabilities

Joomla 75 vulnerabilities

Cisco Internetwork Operating System (IOS) 72 vulnerabilities
Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches.

Jenkins 69 vulnerabilities
Continuous Integration Engine

Red Hat Openstack 67 vulnerabilities

Palo Alto Networks PAN-OS 66 vulnerabilities
PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.

FreeBSD 66 vulnerabilities
Unix OS

NetApp Oncommand Insight 65 vulnerabilities

Cisco Firepower Threat Defense 62 vulnerabilities

Citrix Xen Xen 62 vulnerabilities

GNU Binutils 61 vulnerabilities

PHP 61 vulnerabilities
Web programming language

Adobe Experience Manager 58 vulnerabilities
Adobe Experience Manager (AEM), is a comprehensive content management solution for building websites, mobile apps and forms

Suse Linux Enterprise Desktop 57 vulnerabilities

Adobe ColdFusion 57 vulnerabilities
Web application server since 1995. Tag or script based programming language CFML.

CMS Made Simple 55 vulnerabilities

IBM Rational Quality Manager 55 vulnerabilities

Cybozu Garoon 53 vulnerabilities

Advantech Webaccess 53 vulnerabilities

Quest Disk Backup 52 vulnerabilities

Red Hat Satellite 51 vulnerabilities

Microsoft Excel 51 vulnerabilities
Spreadsheet Software

libming Ming 51 vulnerabilities
Ming is a library for generating Macromedia Flash files (.swf), written in C

Exiv2 50 vulnerabilities

Red Hat Ansible Tower 50 vulnerabilities

FreeRDP 50 vulnerabilities

Intel Graphics Driver 50 vulnerabilities

IBM Api Connect 49 vulnerabilities

WordPress 49 vulnerabilities
Blog Platform

Axiosys Bento4 49 vulnerabilities

Cisco Webex Meetings Server 49 vulnerabilities

Webkitgtk 48 vulnerabilities

Cisco Webex Meetings Online 46 vulnerabilities

Open Emr Openemr 46 vulnerabilities

FasterXML Jackson Databind 46 vulnerabilities
The jackson-databind java library for JSON parsing.

Red Hat Linux Server 45 vulnerabilities

Red Hat Linux Desktop 45 vulnerabilities

Red Hat Linux Workstation 45 vulnerabilities

Apple iPad OS 45 vulnerabilities
Apple iPad Operating System

Dolibarr 44 vulnerabilities

Microsoft Word 44 vulnerabilities

Hdfgroup Hdf5 44 vulnerabilities

VMware Workstation 43 vulnerabilities

Oracle Database Server 43 vulnerabilities
Oracle Database Server

Moodle 43 vulnerabilities

Uclouvain Openjpeg 42 vulnerabilities

Zoneminder 42 vulnerabilities

Oracle Linux 41 vulnerabilities

Foxit Software Reader 41 vulnerabilities

Red Hat Virtualization Host 40 vulnerabilities

Radare2 40 vulnerabilities

OpenSuse Backports Sle 40 vulnerabilities

NetApp Snapmanager 40 vulnerabilities

Adobe Acrobat 39 vulnerabilities
Application for working with PDF documents

Adobe Acrobat Dc 39 vulnerabilities

Adobe Acrobat Reader 39 vulnerabilities

Adobe Acrobat Reader Dc 39 vulnerabilities

Zzcms 39 vulnerabilities

FFmpeg 38 vulnerabilities

Ntp 38 vulnerabilities

Artifex Ghostscript 38 vulnerabilities

Fusionpbx 38 vulnerabilities

Xpdfreader Xpdf 37 vulnerabilities

Microsoft Visual Studio 2017 37 vulnerabilities

NetApp Clustered Data Ontap 37 vulnerabilities

Microsoft Office Online Server 36 vulnerabilities

Nagios Xi 36 vulnerabilities

Microsoft Windows Server 36 vulnerabilities

Prestashop 35 vulnerabilities

VMware Esxi 35 vulnerabilities

Gpac 35 vulnerabilities

Samba 35 vulnerabilities

IBM Maximo Asset Management 35 vulnerabilities

JetBrains Teamcity 35 vulnerabilities

VMware Fusion 34 vulnerabilities

Squid Cache Squid 33 vulnerabilities

Limesurvey 32 vulnerabilities

Cisco Identity Services Engine 32 vulnerabilities

Sugarcrm 32 vulnerabilities

IBM Rational Team Concert 31 vulnerabilities

Isc Bind 31 vulnerabilities

SQLite 31 vulnerabilities
A c library that implements an embedded SQL database engine.

Otrs 31 vulnerabilities

Microsoft Exchange Server 31 vulnerabilities

Open Xchange Appsuite 31 vulnerabilities

GNU Libredwg 31 vulnerabilities

Apache HTTP Server 31 vulnerabilities

Microsoft Visual Studio 2019 31 vulnerabilities

Red Hat Keycloak 30 vulnerabilities

Fortinet Fortios 29 vulnerabilities

IBM Sterling B2b Integrator 29 vulnerabilities

Red Hat Single Sign On 29 vulnerabilities

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8