Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Captcha | Wordpress | 1 | Application |
Role based authorization strategy | Jenkins | 4 | Application |
Time tracker | Upwork | 1 | Application |
Xo security | Xakuro | 1 | Application |
Subiquity | Canonical | 3 | Application |
Zendesk help center | Bestwebsoft | 2 | Application |
Clam antivirus | Cisco | 3 | Application |
Invite anyone | Invite anyone project | 3 | Application |
Cloudeos | Arista | 1 | Operating system |
Git | Jenkins | 11 | Application |
Pingid ssh integration | Pingidentity | 1 | Application |
Jayj quicktag | Jayj quicktag project | 1 | Application |
Adrotate | Ajdg | 5 | Application |
Direct mail | Dkd | 6 | Application |
Nelio ab testing | Neliosoftware | 4 | Application |
Servicestack | Servicestack | 4 | Application |
Church admin | Churchadminplugin | 2 | Application |
Voice builder | 1 | Application | |
Companion auto update | Codeermeneer | 2 | Application |
Icewarp mail server | Merak | 1 | Application |