Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Wf sections | Wf sections | 2 | Application |
| Jose | Jose project | 4 | Application |
| Istar ultra firmware | Johnsoncontrols | 5 | Operating system |
| Istar ultra lt firmware | Johnsoncontrols | 1 | Operating system |
| Istar ultra g2 firmware | Johnsoncontrols | 1 | Operating system |
| Edge g2 firmware | Johnsoncontrols | 1 | Operating system |
| Linux enterprise real time | Suse | 6 | Operating system |
| I class | Applyyourself | 1 | Application |
| Zxhn hs562 firmware | Zte | 1 | Operating system |
| Python hyperkitty | Python hyperkitty project | 1 | Application |
| Rizin | Rizin | 19 | Application |
| Jose node cjs runtime | Jose node cjs runtime project | 6 | Application |
| Ian 02ex voip ata | Utstarcom | 1 | Hardware |
| Expand hash | Expand hash project | 1 | Application |
| Phpjabbers newsletter script | Stivasoft | 1 | Application |
| Image optimizer | Ewww | 4 | Application |
| Active webcam | Py software | 5 | Application |
| Proxysgos | Bluecoat | 2 | Operating system |
| Set getter | Set getter project | 1 | Application |
| Phpjabbers star rating script | Stivasoft | 1 | Application |