Products Security Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Product Name | Vendor Name | Number of CVE | Product Type |
|---|---|---|---|
| Beauty salon management system | Campcodes | 21 | Application |
| Dkim milter | Dkim | 1 | Application |
| Electric sheep | Scott draves | 2 | Application |
| Mongoose | Mongoosejs | 5 | Application |
| Jetik web | Jetik | 1 | Application |
| Pagure | Redhat | 9 | Application |
| Sofi webgui | Muskatli | 1 | Application |
| C language server protocol | Dotnetfoundation | 1 | Application |
| Computing for good s basic laboratory information system | Gatech | 3 | Application |
| Core firmware | Taphome | 2 | Operating system |
| Metasploit | Rapid7 | 17 | Application |
| Openrat | Openrat | 1 | Application |
| Bzflag server | Bzflag | 1 | Application |
| Easyappointments | Easyappointments | 29 | Application |
| Jooblog | Jooblog | 1 | Application |
| Eventmesh | Apache | 3 | Application |
| Java system identity server | Sun | 2 | Application |
| Hotscripts clone | Greatclone | 1 | Application |
| Vslider | Vibethemes | 1 | Application |
| Opencall media platform | Hpe | 1 | Application |