Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Yo | Life before us | 1 | Application |
Magic2 firmware | Huawei | 1 | Operating system |
Simple blog card | Riverforest wp | 2 | Application |
Netcharts server | Visualmining | 1 | Application |
Radio javan | Radiojavan | 1 | Application |
Netcharts server | Visual mining | 1 | Application |
Ninja forms contact form | Ninjaforms | 1 | Application |
User activity tracking and log | Mooveagency | 2 | Application |
Ellentube | Warnerbros | 1 | Application |
Poeditor | Poeditor | 4 | Application |
Honor v30 firmware | Huawei | 3 | Operating system |
Healthy recipes and grocery deals | Zipongo inc | 1 | Application |
Reservation studio | Reservation | 1 | Application |
Big ip protocol security manager | F5 | 1 | Application |
Interval international | Interval international | 1 | Application |
Mobile call now map buttons | Davidsword | 1 | Application |
Garden linux | Cloudfoundry | 1 | Application |
Wordpress tables | Iansadowsky | 1 | Application |
Shopwell healthy diet grocery food scanner | Yottamark inc | 1 | Application |
Terminal emulation | Wavelink | 1 | Application |