Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Meraki mr30h firmware | Cisco | 5 | Operating system |
Myscrapbook | Myscrapbook | 3 | Application |
Meraki mr32 firmware | Cisco | 5 | Operating system |
Aqua microscanner | Jenkins | 2 | Application |
Meraki mr33 firmware | Cisco | 5 | Operating system |
Meraki mr34 firmware | Cisco | 5 | Operating system |
Meraki mr36 firmware | Cisco | 5 | Operating system |
Meraki mr42 firmware | Cisco | 5 | Operating system |
Meraki mr42e firmware | Cisco | 5 | Operating system |
Gitlab logo | Jenkins | 1 | Application |
Meraki mr44 firmware | Cisco | 5 | Operating system |
35mmslidegallery | Andy mack | 1 | Application |
Meraki mr45 firmware | Cisco | 5 | Operating system |
Meraki mr46 firmware | Cisco | 5 | Operating system |
Meraki mr46e firmware | Cisco | 5 | Operating system |
Meraki mr52 firmware | Cisco | 5 | Operating system |
Meraki mr53 firmware | Cisco | 5 | Operating system |
Meraki mr53e firmware | Cisco | 5 | Operating system |
Meraki mr55 firmware | Cisco | 5 | Operating system |
Meraki mr56 firmware | Cisco | 5 | Operating system |