Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Failed job deactivator | Jenkins | 2 | Application |
| Failure | Failure project | 2 | Application |
| Fairy princess makeover salon | Mobgams | 1 | Application |
| Fakabao | 7 card | 4 | Application |
| Fake identd | Fake identd | 1 | Application |
| Fake magazine cover script | Fake magazine cover script project | 1 | Application |
| Faktory | Contribsys | 1 | Application |
| Falang | Faboba | 7 | Application |
| Falco | Falco | 2 | Application |
| Falcon | Crowdstrike | 2 | Application |
| Falcon 8 | Intel | 1 | Hardware |
| Falcon 8 uas asctec thermal viewer | Intel | 1 | Hardware |
| Falcon 8 uas asctec thermal viewer firmware | Intel | 1 | Operating system |
| Falcon linux | Asrmicro | 10 | Operating system |
| Falconpl | Falconpl | 1 | Application |
| Falcon plus | Open falcon | 1 | Application |
| Falconseye | Falconseye project | 1 | Application |
| Falcon web server | Blueface | 4 | Application |
| Falcon web server | Falcon | 1 | Application |
| Falcon xlweb linux controller | Honeywell | 2 | Hardware |