CVE Releases the Critical List of Top 50 'Distinct' Vulnerability Products
FREMONT, CA: IT in the past decade has faced immense criticism over software exploitation, and the trend has shown no hints of stopping with security flaws and glitches scoring high in 2015 as well. CVE (Common Vulnerabilities and Exposures) Details has released the latest chart of top 50 products by total number of ‘Distinct’ vulnerabilities in 2015. CVE is based upon a reference method to provide information- security vulnerabilities in public platform.
Leading from the front in the infamous list is Apple, by holding the top two spots. With a maximum of 384 vulnerabilities Apple’s Mac OS X has narrowly toppled iPhone OS, which registers 375 vulnerabilities. Not surprisingly, Adobe products have locked the four consecutive positions starting from three to six. Flash player, finishes this year run in the third spot with 314 vulnerabilities, followed by Adobe’s Air Sdk, Air Sdk & Compiler and AIR itself. The much talked about Java, instead has got a reason to smile this year by landing down the table, with JRE and JDK holding the 29th and 30th spot respectively.
Microsoft has always been synonymous with security constraints. But tables have turned this year as Microsoft slips further down from its long held spot. Internet Explorer continues to rank as the most unsafe browser with 231 reported vulnerabilities, followed by Chrome and Firefox, which has fared badly to be featured in the 8th and 9th spot. However, in the overall tally Microsoft has claimed the top notch spot with the support cast of various Windows versions, registering the most number of vulnerability, where Adobe has fallen second in the list.
Other prominent product finding a place in the 2015 edition of top 50 list includes Safari, Android, Acrobat, Windows Server, E-Business Suite, Debian Linux, itunes to name a few.
Time and again there has been a security concern related with software or in operating systems resulting in the software to become unresponsive or crashing. These findings will however help the company’s professionals to focus more in their operation in preventing and curbing the effect of attacks, and also in encouraging the development of security strategies.
The rankings are based on the working method of the automated vulnerability discovery tools, which updates vulnerabilities according to the number of impact caused as well as depth of severity.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....