Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Webform validation | Svendecabooter | 1 | Application |
| Social book facebook clone monster | Clonemonster | 1 | Application |
| Video player | Sohu | 1 | Application |
| Parameterized remote trigger | Jenkins | 1 | Application |
| Cloudmusic | Netease | 1 | Application |
| Database | Jenkins | 3 | Application |
| Book borrower system | Rems | 0 | Application |
| Passlogix v go self service password reset and oem | Oracle | 1 | Application |
| Financial calculator | Systematica | 1 | Application |
| Fix adapter | Systematica | 1 | Application |
| Http adapter | Systematica | 1 | Application |
| Mssql messagebus proxy | Systematica | 1 | Application |
| Radius | Systematica | 1 | Application |
| Smtp adapter | Systematica | 1 | Application |
| Valgrind | Jenkins | 2 | Application |
| Klocwork analysis | Jenkins | 1 | Application |
| Jsherp | Huaxiaerp | 2 | Application |
| Jsgames | Jenkins | 1 | Application |
| Keepserverex | Ptc | 2 | Application |
| Aes encryption module | Johan lindskog | 1 | Application |