The table contains information on 312 cybersecurity vulnerabilities, including details on the CVE, vendor, product, type, description, date discovered, date patched, advisory, analysis URL, root cause analysis, and reporter. This data can be used to track and analyze security threats, prioritize patching efforts, and understand the impact of vulnerabilities on different products and vendors.
Is Your Data Too Big for Excel? Why Choose Between Database vs Spreadsheet? With Gigasheet, You Get the Best of Both.
Explore Gigasheet. Sign up and start right away. Experience the power of Gigasheet with our sample data. Dive into large-scale data analysis effortlessly—no download required. Try it right here 👇