Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Azure machine learning | Microsoft | 3 | Application |
Gcw 1010 | Gynoii | 1 | Hardware |
Gcw 1020 | Gynoii | 1 | Hardware |
Tcl tk | Tcl tk | 5 | Application |
Send customer voice survey from dynamics 365 | Microsoft | 2 | Application |
Gpw 1025 | Gynoii | 1 | Hardware |
Tcl tk | Tcl | 1 | Application |
In sight b120 37 | Philips | 3 | Hardware |
Helpbox | Layton technology | 10 | Application |
Binutils gold | Gnu | 1 | Application |
Hublin | Linagora | 1 | Application |
Jooby | Jooby | 3 | Application |
Peek a view firmware | Lens laboratories | 1 | Operating system |
Http request | Http request project | 1 | Application |
M6 baby monitor firmware | Ibaby | 1 | Operating system |
Nioextras | Apple | 1 | Application |
Xeon e5 1428l | Intel | 7 | Hardware |
M3s baby monitor firmware | Ibaby | 1 | Operating system |
Cubefs | Linuxfoundation | 6 | Application |
Xeon e5 1428l v2 | Intel | 7 | Hardware |