Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Fail2ban | Fail2ban | 9 | Application |
| Plot | Jenkins | 2 | Application |
| Becky internet mail | Rimarts | 2 | Application |
| Build metrics | Jenkins | 3 | Application |
| Theme demo import | Themely | 2 | Application |
| Uptimed | Uptimed project | 1 | Application |
| Rich text publisher | Jenkins | 1 | Application |
| Canvas learning management service | Instructure | 2 | Application |
| Project inheritance | Jenkins | 6 | Application |
| Matrix reloaded | Jenkins | 2 | Application |
| Nprinting designer | Qlik | 1 | Application |
| Qlikview | Qlik | 3 | Application |
| Extreme feedback panel | Jenkins | 1 | Application |
| Tor | Tor project | 5 | Application |
| Validating email parameter | Jenkins | 1 | Application |
| Thinkbook 14 iml firmware | Lenovo | 3 | Operating system |
| Thinkbook 14 iil firmware | Lenovo | 3 | Operating system |
| Thinkbook 15 iil firmware | Lenovo | 3 | Operating system |
| Thinkbook 15 iml firmware | Lenovo | 3 | Operating system |
| Yoga c640 13iml lte firmware | Lenovo | 3 | Operating system |