Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Zero cms | Zero cms | 2 | Application |
Web p2p | Dahuasecurity | 1 | Application |
Framework | Horde | 1 | Application |
Deepin desktop environment | Deepin | 1 | Application |
Ops manager | Mongodb | 5 | Application |
Vfp ole server activex control | Microsoft | 1 | Application |
Password manager | Trendmicro | 15 | Application |
Spring security | Pivotal software | 5 | Application |
Rich textbox control | Microsoft | 1 | Application |
Openvas scanner | Openvas | 1 | Application |
Mitogen | Networkgenomics | 1 | Application |
Free range routing | Linuxfoundation | 1 | Application |
Unified threat management | Securepoint | 2 | Operating system |
Simple file list | Simplefilelist | 6 | Application |
Evolution data server3 | Gnome | 1 | Application |
Svg sanitizer | Typo3 | 1 | Application |
Views builk operations | Drupal | 1 | Application |
Static analysis utilities | Jenkins | 4 | Application |
Autoswitch python virtualenv | Autoswitch python virtualenv project | 1 | Application |
Iobroker web | Iobroker | 1 | Application |