Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Purchasing | Oracle | 2 | Application |
| Xeon e3 1220 | Intel | 13 | Hardware |
| Xeon e3 1220 v2 | Intel | 6 | Hardware |
| Redis srvr | Redis srvr project | 1 | Application |
| Sourcing | Oracle | 3 | Application |
| Xeon e3 1220 v3 | Intel | 7 | Hardware |
| Xeon e3 1220 v5 | Intel | 26 | Hardware |
| Xeon e3 1220 v6 | Intel | 29 | Hardware |
| Xeon e3 1220l v2 | Intel | 6 | Hardware |
| Linux enterprise sdk | Suse | 19 | Operating system |
| Node thulac | Geohey | 1 | Application |
| Xeon e3 1220l v3 | Intel | 7 | Hardware |
| Xeon e3 1221 v3 | Intel | 5 | Hardware |
| Node bsdiff android | Node bsdiff android project | 1 | Application |
| Labor distribution | Oracle | 1 | Application |
| Xeon e3 1225 | Intel | 15 | Hardware |
| Xeon e3 1225 v2 | Intel | 6 | Hardware |
| Cmake | Cmake project | 1 | Application |
| Xeon e3 1225 v3 | Intel | 7 | Hardware |
| Xeon e3 1225 v5 | Intel | 26 | Hardware |