Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| A blog | A blog | 6 | Application |
| G5 5000 firmware | Dell | 51 | Operating system |
| Purchase order management system | Purchase order management system project | 9 | Application |
| G5 5090 firmware | Dell | 49 | Operating system |
| G7 15 7500 firmware | Dell | 32 | Operating system |
| Dogecoin | Dogecoin | 2 | Application |
| G7 15 7590 firmware | Dell | 32 | Operating system |
| Blogphp | Blogphp | 5 | Application |
| Codimd | Hackmd | 6 | Application |
| Web applications | Microsoft | 9 | Application |
| G7 17 7700 firmware | Dell | 36 | Operating system |
| G7 17 7790 firmware | Dell | 44 | Operating system |
| Latitude 3480 firmware | Dell | 48 | Operating system |
| Latitude 3580 firmware | Dell | 48 | Operating system |
| Maya usd | Autodesk | 6 | Application |
| Interscan messaging security virtual appliance | Trendmicro | 13 | Application |
| Precision 5820 tower firmware | Dell | 50 | Operating system |
| Precision 7820 tower firmware | Dell | 48 | Operating system |
| Precision 7920 tower firmware | Dell | 48 | Operating system |
| Embedded box pc 5000 firmware | Dell | 59 | Operating system |