Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Bearer auth | Fastify | 1 | Application |
| Fast permission administration | Fast permissions administration project | 1 | Application |
| Webex training | Cisco | 1 | Application |
| Hatch | Alienwp | 1 | Application |
| Documentum xcp | Emc | 3 | Application |
| Stage file proxy | Stage file proxy project | 2 | Application |
| Email security appliance firmeware | Cisco | 1 | Operating system |
| Botcha | Botcha spam prevention project | 1 | Application |
| Hawtjni | Redhat | 1 | Application |
| Barracudadrive | Realtimelogic | 2 | Application |
| Noise java | Noise java project | 3 | Application |
| Continuous delivery automation | Hp | 1 | Application |
| Toybox | Toybox project | 1 | Application |
| Bestzip | Bestzip project | 1 | Application |
| Backup exec continuous protection server | Symantec | 1 | Application |
| Unified ip phone 8945 | Cisco | 3 | Hardware |
| Analytics and location engine | Arubanetworks | 1 | Application |
| Swift | Isode | 1 | Application |
| Veritas application director | Symantec | 1 | Application |
| Veritas cluster server | Symantec | 1 | Application |