Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Xeon e5 2618l v3 | Intel | 7 | Hardware |
Xeon e5 2618l v4 | Intel | 7 | Hardware |
Xeon e5 2620 | Intel | 7 | Hardware |
Xeon e5 2620 v2 | Intel | 7 | Hardware |
Arena simulation software | Rockwellautomation | 3 | Application |
Fire os | Amazon | 12 | Operating system |
Xeon e5 2620 v3 | Intel | 7 | Hardware |
Xeon e5 2620 v4 | Intel | 7 | Hardware |
Linux enterprise point of sale | Suse | 4 | Application |
Nextcloud mail | Nextcloud | 5 | Application |
Xeon e5 2623 v3 | Intel | 7 | Hardware |
Axis communications firmware | Axis | 2 | Operating system |
Xeon e5 2623 v4 | Intel | 7 | Hardware |
Frenic loader | Fujielectric | 4 | Operating system |
Xeon e5 2628l v2 | Intel | 7 | Hardware |
Actionpack page caching | Rubyonrails | 2 | Application |
Xeon e5 2628l v3 | Intel | 7 | Hardware |
Linux for tegra | Nvidia | 4 | Operating system |
Edoc libraries | Eparaksts | 2 | Application |
Xeon e5 2628l v4 | Intel | 7 | Hardware |