Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Single sign on | Redhat | 4 | Application |
Software development kit | Splunk | 1 | Application |
Keycloak | Keycloak | 5 | Application |
Elefant | Elefantcms | 2 | Application |
Vmware workstation | Vmware | 15 | Application |
Spiceworks | Spiceworks | 7 | Application |
Php live helper | Turnkeywebtools | 3 | Application |
Planning analytics | Ibm | 30 | Application |
Gitolite | Gitolite | 7 | Application |
Open zaak | Openzaak | 1 | Application |
Uftpd | Troglobit | 5 | Application |
Gl ar300m lite firmware | Gl inet | 4 | Operating system |
Thinkcentre m710s firmware | Lenovo | 11 | Operating system |
Thinkcentre m710t firmware | Lenovo | 11 | Operating system |
Aio e95 firmware | Lenovo | 1 | Operating system |
Stb image h | Nothings | 15 | Application |
Ultimate form builder lite | Accesspressthemes | 2 | Application |
Xen | Citrix | 9 | Application |
Zzzphp | Zzzcms | 14 | Application |
Jp1 integrated management service support | Hitachi | 2 | Application |