Top 50 in years 2013 Úvod  Graf  Katalog Zranitelností  OWASP  Webové útoky (103)  Vulnerebility  Web Vul.  Top 50 in years  CVE Defination  ATT&CK Matrix for Enterprise

Úvod  1999  2000  2001  2002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  2018  2019  2020


1 Linux Kernel Linux OS 189
2 JRE Oracle Application 180
3 JDK Oracle Application 180
4 Chrome Google Application 174
5 Firefox Mozilla Application 149
6 Opensuse Opensuse OS 137
7 JDK SUN Application 131
8 JRE SUN Application 130
9 Internet Explorer Microsoft Application 128
10 Thunderbird Mozilla Application 113
11 Seamonkey Mozilla Application 104
12 Windows Server 2008 Microsoft OS 103
13 Firefox Esr Mozilla Application 100
14 Windows 7 Microsoft OS 99
15 Iphone Os Apple OS 96
16 Windows Vista Microsoft OS 95
17 Ubuntu Linux Canonical OS 92
18 Thunderbird Esr Mozilla Application 91
19 Windows Xp Microsoft OS 87
20 Debian Linux Debian OS 85
21 Wireshark Wireshark Application 82
22 Enterprise Linux Redhat OS 78
23 Windows Server 2003 Microsoft OS 77
24 Ffmpeg Ffmpeg Application 77
25 Mac Os X Apple OS 72
26 Mysql Oracle Application 66
27 Acrobat Reader Adobe Application 66
28 Acrobat Adobe Application 64
29 Windows 8 Microsoft OS 58
30 Flash Player Adobe Application 56
31 Windows Server 2012 Microsoft OS 52
32 Windows Rt Microsoft OS 43
33 XEN XEN OS 42
34 Mysql Mysql Application 42
35 Moodle Moodle Application 42
36 Sunos SUN OS 41
37 Fusion Middleware Oracle Application 40
38 Peoplesoft Products Oracle Application 38
39 Unified Computing System Cisco Hardware 37
40 Javafx Oracle Application 36
41 Itunes Apple Application 36
42 IOS Cisco OS 34
43 Adaptive Security Appliance Software Cisco Application 33
44 Nx-os Cisco OS 32
45 Maximo Asset Management IBM Application 30
46 Sterling B2b Integrator IBM Application 29
47 Sterling File Gateway IBM Application 28
48 Siebel Crm Oracle Application 27
49 Websphere Application Server IBM Application 27
50 Unified Communications Manager Cisco Application 26