Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Single sign on | Redhat | 4 | Application |
| Software development kit | Splunk | 1 | Application |
| Keycloak | Keycloak | 71 | Application |
| Elefant | Elefantcms | 2 | Application |
| Vmware workstation | Vmware | 15 | Application |
| Spiceworks | Spiceworks | 7 | Application |
| Php live helper | Turnkeywebtools | 3 | Application |
| Planning analytics | Ibm | 30 | Application |
| Gitolite | Gitolite | 7 | Application |
| Open zaak | Openzaak | 1 | Application |
| Uftpd | Troglobit | 5 | Application |
| Gl ar300m lite firmware | Gl inet | 4 | Operating system |
| Thinkcentre m710s firmware | Lenovo | 11 | Operating system |
| Thinkcentre m710t firmware | Lenovo | 11 | Operating system |
| Aio e95 firmware | Lenovo | 1 | Operating system |
| Stb image h | Nothings | 27 | Application |
| Ultimate form builder lite | Accesspressthemes | 2 | Application |
| Xen | Citrix | 9 | Application |
| Zzzphp | Zzzcms | 14 | Application |
| Jp1 integrated management service support | Hitachi | 2 | Application |