Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Xeon e5 2618l v3 | Intel | 7 | Hardware |
| Xeon e5 2618l v4 | Intel | 7 | Hardware |
| Xeon e5 2620 | Intel | 7 | Hardware |
| Xeon e5 2620 v2 | Intel | 7 | Hardware |
| Arena simulation software | Rockwellautomation | 3 | Application |
| Fire os | Amazon | 13 | Operating system |
| Xeon e5 2620 v3 | Intel | 7 | Hardware |
| Xeon e5 2620 v4 | Intel | 7 | Hardware |
| Linux enterprise point of sale | Suse | 4 | Application |
| Nextcloud mail | Nextcloud | 5 | Application |
| Xeon e5 2623 v3 | Intel | 7 | Hardware |
| Axis communications firmware | Axis | 2 | Operating system |
| Xeon e5 2623 v4 | Intel | 7 | Hardware |
| Frenic loader | Fujielectric | 4 | Operating system |
| Xeon e5 2628l v2 | Intel | 7 | Hardware |
| Actionpack page caching | Rubyonrails | 2 | Application |
| Xeon e5 2628l v3 | Intel | 7 | Hardware |
| Linux for tegra | Nvidia | 6 | Operating system |
| Edoc libraries | Eparaksts | 2 | Application |
| Xeon e5 2628l v4 | Intel | 7 | Hardware |