Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
C629a firmware | Intel | 1 | Operating system |
Core i3 l13g4 firmware | Intel | 4 | Operating system |
Core i5 l16g7 firmware | Intel | 4 | Operating system |
Pike | Pike | 1 | Application |
Xeon d2700 firmware | Intel | 2 | Operating system |
Phpcodecabinet | Brad fears | 2 | Application |
Bes | Opendap | 2 | Application |
Hyrax | Opendap | 2 | Application |
Torbstoff news | Torbstoff | 1 | Application |
Shack forms pro | Joomlashack | 1 | Application |
Open cubic player | Open cubic player | 1 | Application |
Netious cms | Netious cms | 2 | Application |
Globallink | Ourgame com | 2 | Application |
Leadtools jpeg 2000 | Lead technologies | 1 | Application |
Phpautomembersarea | David walker | 2 | Application |
Fuzzylime | Fuzzylime | 2 | Application |
Sunlight cms | Sunlight cms | 1 | Application |
Mate 30 5g firmware | Huawei | 2 | Operating system |
Focus sis | Focus sis | 2 | Application |
Live support | Alstrasoft | 1 | Application |