Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Pull requests and issues | Github | 1 | Application |
| Pentium j3710 | Intel | 9 | Hardware |
| Pentium j6426 | Intel | 7 | Hardware |
| Pentium n3510 | Intel | 9 | Hardware |
| Pentium n3520 | Intel | 9 | Hardware |
| Pentium n3530 | Intel | 10 | Hardware |
| Pentium n3540 | Intel | 10 | Hardware |
| Pentium n3700 | Intel | 8 | Hardware |
| Push notifications | Adobe | 1 | Application |
| Pentium n3710 | Intel | 8 | Hardware |
| Pentium silver a1030 | Intel | 3 | Hardware |
| Payment form for paypal pro | Codepeople | 1 | Application |
| Pentium silver n6000 | Intel | 18 | Hardware |
| Pentium silver n6005 | Intel | 18 | Hardware |
| Resads | Web mv | 3 | Application |
| Integrated performance primitives cryptography | Intel | 9 | Application |
| Easy2map | Easy2map | 2 | Application |
| Content security reporter | Mcafee | 1 | Application |
| Restrictedpython | Zope | 4 | Application |
| Hexagon | Hexagontoken | 1 | Application |