Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Job generator | Jenkins | 1 | Application |
| Wp oauth2 server | Codexshaper | 1 | Application |
| Validating string parameter | Jenkins | 1 | Application |
| Node and label parameter | Jenkins | 1 | Application |
| Computer queue | Jenkins | 1 | Application |
| Dataease | Dataease project | 3 | Application |
| Perfecto | Jenkins | 2 | Application |
| Fuseiso | Fuseiso project | 2 | Application |
| Radiator view | Jenkins | 1 | Application |
| Publish over ftp | Jenkins | 2 | Application |
| Custom job icon | Jenkins | 1 | Application |
| Description column | Jenkins | 1 | Application |
| Wg300hp firmware | Aterm | 1 | Operating system |
| Mongodb | Jenkins | 2 | Application |
| Wf800hp firmware | Aterm | 2 | Operating system |
| Xiv storage system gen3 firmware | Ibm | 1 | Operating system |
| Chosen views tabbar | Jenkins | 1 | Application |
| Zenworks asset management | Novell | 3 | Application |
| Clearcase release | Jenkins | 1 | Application |
| Standard | Mutiny | 1 | Application |