Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Abandoned cart lite for woocommerce | Tychesoftwares | 5 | Application |
| Abandoned cart pro for woocommerce | Tychesoftwares | 1 | Application |
| Purity | Purestorage | 5 | Application |
| Cloud backup suite | Ahsay | 7 | Application |
| Mojarra | Oracle | 4 | Application |
| Simple forum | Gerd tentler | 2 | Application |
| Duplicate post | Duplicate post project | 3 | Application |
| Blackarmor nas 220 firmware | Seagate | 5 | Operating system |
| Ox app suite | Open xchange | 66 | Application |
| Spss modeler | Ibm | 6 | Application |
| Spectrum lsf | Ibm | 4 | Application |
| Vx search | Flexense | 7 | Application |
| Pre dynamic institution | Pre projects | 1 | Application |
| Activity log | Pojo | 4 | Application |
| Word wrap | Word wrap project | 1 | Application |
| Mediator framework | Cisco | 6 | Application |
| Middleware common libraries and tools | Oracle | 9 | Application |
| Payment interface | Oracle | 3 | Application |
| Powerstoret os | Dell | 1 | Operating system |
| Bestwebsoft | 2 | Application |