Top 50 in years 2006 Úvod  Graf  Katalog Zranitelností  OWASP  Webové útoky (103)  Vulnerebility  Web Vul.  Top 50 in years  CVE Defination  ATT&CK Matrix for Enterprise

Úvod  1999  2000  2001  2002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  2018  2019  2020


1 Mac Os X Apple OS 106
2 Firefox Mozilla Application 101
3 IE Microsoft Application 92
4 Linux Kernel Linux OS 90
5 Seamonkey Mozilla Application 70
6 Thunderbird Mozilla Application 65
7 Database Server Oracle Application 63
8 Windows Xp Microsoft OS 56
9 Mac Os X Server Apple OS 55
10 Windows 2003 Server Microsoft OS 45
11 Solaris SUN OS 44
12 Windows 2000 Microsoft OS 42
13 Mybulletinboard Mybulletinboard Application 42
14 Application Server Oracle Application 40
15 PHP PHP Application 33
16 Office Microsoft Application 33
17 E-business Suite Oracle Application 32
18 Freebsd Freebsd OS 27
19 Joomla Joomla Application 26
20 Netbsd Netbsd OS 25
21 Weblogic Server BEA Application 24
22 Websphere Application Server IBM Application 23
23 Phpbb Phpbb Group Application 22
24 AIX IBM OS 21
25 Invision Power Board Invision Power Services Application 21
26 Debian Linux Debian OS 21
27 Sunos SUN OS 21
28 Quicktime Apple Application 20
29 Hp-ux HP OS 20
30 Mozilla Suite Mozilla Application 19
31 Collaboration Suite Oracle Application 18
32 Moodle Moodle Application 17
33 Drupal Drupal Application 17
34 Excel Microsoft Application 16
35 TOR TOR Application 16
36 Wordpress Wordpress Application 16
37 Deluxebb Deluxebb Application 15
38 Burning Board Woltlab Application 15
39 Workcentre Xerox Hardware 15
40 Wireshark Wireshark Application 14
41 Mysql Mysql Application 14
42 Libtiff Libtiff Application 14
43 Vbulletin Jelsoft Application 13
44 Phpmyadmin Phpmyadmin Application 13
45 Ubuntu Linux Canonical OS 13
46 Workcentre 255 Xerox Hardware 12
47 Workcentre 245 Xerox Hardware 12
48 Workcentre 238 Xerox Hardware 12
49 Workcentre 232 Xerox Hardware 12
50 Ethereal Ethereal Group Application 12