Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Px 602f firmware | Epson | 1 | Operating system |
Html5 maps | Fla shop | 2 | Application |
Bedita | Bedita | 6 | Application |
Bughotel reservation system | Bug software | 1 | Application |
Custom css pro | Waspthemes | 1 | Application |
Gemchain | Gemchain project | 1 | Application |
Bus ticket booking with seat reservation | Mage people | 4 | Application |
Tdiary | Tdiary | 4 | Application |
Bonustoken | Bonustoken project | 1 | Application |
Digital experience platform | Liferay | 121 | Application |
Celeron g1850 firmware | Intel | 6 | Operating system |
Cryptonitexcoin | Cryptonitexcoin project | 1 | Application |
Celeron g1840t firmware | Intel | 6 | Operating system |
Celeron g1840 firmware | Intel | 6 | Operating system |
Celeron g1830 firmware | Intel | 6 | Operating system |
Celeron g1820te firmware | Intel | 5 | Operating system |
Celeron g1820t firmware | Intel | 6 | Operating system |
Celeron g1630 firmware | Intel | 6 | Operating system |
Com jeeventcalendar | Harmistechnology | 2 | Application |
Open xchange appsuite backend | Open xchange | 15 | Application |