Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Captcha | Wordpress | 1 | Application |
| Role based authorization strategy | Jenkins | 4 | Application |
| Time tracker | Upwork | 1 | Application |
| Xo security | Xakuro | 1 | Application |
| Subiquity | Canonical | 3 | Application |
| Zendesk help center | Bestwebsoft | 2 | Application |
| Clam antivirus | Cisco | 3 | Application |
| Invite anyone | Invite anyone project | 3 | Application |
| Cloudeos | Arista | 1 | Operating system |
| Git | Jenkins | 11 | Application |
| Pingid ssh integration | Pingidentity | 1 | Application |
| Jayj quicktag | Jayj quicktag project | 1 | Application |
| Adrotate | Ajdg | 5 | Application |
| Direct mail | Dkd | 6 | Application |
| Nelio ab testing | Neliosoftware | 4 | Application |
| Servicestack | Servicestack | 4 | Application |
| Church admin | Churchadminplugin | 2 | Application |
| Voice builder | 1 | Application | |
| Companion auto update | Codeermeneer | 3 | Application |
| Icewarp mail server | Merak | 1 | Application |