Products Security Index
Product Directory
This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Jigsaw | W3c | 3 | Application |
| Jikes | Jikes project | 1 | Application |
| Jim component | Joomla | 1 | Application |
| Jim component | Mambo | 1 | Application |
| Jim instant messaging component | Joomla | 1 | Application |
| Jimmy al00a | Huawei | 1 | Hardware |
| Jimmy al00a firmware | Huawei | 1 | Operating system |
| Jimoty | Jmty | 1 | Application |
| Jim rees httpd | Jim rees | 1 | Application |
| Jimtawl | Jimtawl project | 1 | Application |
| Jimtawl | Janguo | 1 | Application |
| Jimureport | Jeecg | 8 | Application |
| Jingyun antivirus | V secure | 5 | Application |
| Jinher oa | Jinher | 11 | Application |
| Jinher oa c6 | Jinher | 2 | Application |
| Jinitiator | Oracle | 2 | Application |
| Jinja | Palletsprojects | 8 | Application |
| Jinja2 | Pocoo | 3 | Application |
| Jinjava | Hubspot | 4 | Application |
| Jinshan pdf | Kingsoft | 1 | Application |