Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Jg091a | Hp | 1 | Hardware |
Jg092a | Hp | 1 | Hardware |
Jg182a | Hp | 1 | Hardware |
Organizr | Organizr | 10 | Application |
Jg183a | Hp | 1 | Hardware |
Jg184a | Hp | 1 | Hardware |
Jg207a | Hp | 1 | Hardware |
Jg208a | Hp | 1 | Hardware |
Jg209a | Hp | 1 | Hardware |
Jg210a | Hp | 1 | Hardware |
Jg213a | Hp | 1 | Hardware |
Jg214a | Hp | 1 | Hardware |
Jg215a | Hp | 1 | Hardware |
Jg221a | Hp | 1 | Hardware |
Jg222a | Hp | 1 | Hardware |
Jg223a | Hp | 1 | Hardware |
Jg225a | Hp | 1 | Hardware |
Jg236a | Hp | 1 | Hardware |
Sendcard | Sendcard | 6 | Application |
Jg237a | Hp | 1 | Hardware |