Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Conferenceroom | Webmaster | 1 | Application |
| Conference scheduler | Myceliumdesign | 2 | Application |
| Conference scheduler cli | Pyconuk | 1 | Application |
| Conference server | First virtual communications | 1 | Application |
| Confetti fall animation | Wpdeveloperr | 2 | Application |
| Confidental containers | Microsoft | 1 | Application |
| Confidential computing manager | Fortanix | 2 | Application |
| Confidential file decryption | Hitachi solutions | 2 | Application |
| Confidential file viewer | Hitachi solutions | 1 | Application |
| Confidential sidecar containers | Microsoft | 1 | Application |
| Config | Phoenixcontact | 6 | Application |
| Config encrypt tool add rsa | Yealink | 1 | Application |
| Config file provider | Jenkins | 9 | Application |
| Configfree | Toshiba | 1 | Application |
| Configfree utility | Toshiba | 1 | Application |
| Configgrpc | Opentelemetry | 1 | Application |
| Config handler | Config handler project | 1 | Application |
| Confighttp | Opentelemetry | 1 | Application |
| Config inifiles | Shlomi fish | 1 | Application |
| Config lib | Config lib project | 1 | Application |