Products Security Index
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Product Name | Vendor Name | Number of CVE | Product Type | 
|---|---|---|---|
| Bearer auth | Fastify | 1 | Application | 
| Fast permission administration | Fast permissions administration project | 1 | Application | 
| Webex training | Cisco | 1 | Application | 
| Hatch | Alienwp | 1 | Application | 
| Documentum xcp | Emc | 3 | Application | 
| Stage file proxy | Stage file proxy project | 2 | Application | 
| Email security appliance firmeware | Cisco | 1 | Operating system | 
| Botcha | Botcha spam prevention project | 1 | Application | 
| Hawtjni | Redhat | 1 | Application | 
| Barracudadrive | Realtimelogic | 2 | Application | 
| Noise java | Noise java project | 3 | Application | 
| Continuous delivery automation | Hp | 1 | Application | 
| Toybox | Toybox project | 1 | Application | 
| Bestzip | Bestzip project | 1 | Application | 
| Backup exec continuous protection server | Symantec | 1 | Application | 
| Unified ip phone 8945 | Cisco | 3 | Hardware | 
| Analytics and location engine | Arubanetworks | 1 | Application | 
| Swift | Isode | 1 | Application | 
| Veritas application director | Symantec | 1 | Application | 
| Veritas cluster server | Symantec | 1 | Application |