Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Wings | Pterodactyl | 7 | Application |
| Widget host monitoring | Centreon | 1 | Application |
| Xeon e5 2697a v4 | Intel | 29 | Hardware |
| Xeon e5 2698 v3 | Intel | 21 | Hardware |
| Ballerina | Ballerina | 1 | Application |
| Swan lake | Ballerina | 1 | Application |
| Xeon e5 2698 v4 | Intel | 29 | Hardware |
| Centreon host monitoring widget | Centreon | 3 | Application |
| Npm test sqlite3 trunk | Mapbox | 1 | Application |
| Xeon e5 2699 v3 | Intel | 21 | Hardware |
| Xeon e5 2699 v4 | Intel | 29 | Hardware |
| Xeon e5 2699a v4 | Intel | 29 | Hardware |
| Xeon e5 2699r v4 | Intel | 26 | Hardware |
| Centreon tactical overview widget | Centreon | 3 | Application |
| Windows latestchromedriver | Windows latestchromedriver project | 1 | Application |
| Xeon e5 4610 v3 | Intel | 21 | Hardware |
| Xeon e5 4610 v4 | Intel | 26 | Hardware |
| Xeon e5 4620 v3 | Intel | 21 | Hardware |
| Xeon e5 4620 v4 | Intel | 27 | Hardware |
| Xeon e5 4627 v3 | Intel | 21 | Hardware |