Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Site banner | Site banner project | 1 | Application |
Social share buttons analytics | Getsocial | 2 | Application |
3d visual enterprise author | Sap | 27 | Application |
Phpbookingcalendar | Jjwwebdesign | 1 | Application |
Tablefield | Tablefield project | 1 | Application |
Gdpr cookie consent | Supsystic | 1 | Application |
Guake | Guake project | 1 | Application |
Dofollow case by case | Apasionados | 3 | Application |
Git | Git project | 7 | Application |
Pixel motion blog | Pixel motion | 7 | Application |
Marketo ma | Marketo ma project | 1 | Application |
U2 universe | Ibm | 4 | Application |
Gift up gift cards for wordpress and woocommerce | Giftup | 2 | Application |
Argencoders notevil | Argencoders notevil project | 1 | Application |
Notevil | Notevil project | 1 | Application |
Guest author | Webfactoryltd | 1 | Application |
Suretriggers | Suretriggers | 2 | Application |
Xfstt | Xfstt | 1 | Application |
Opentaxii | Eclecticiq | 1 | Application |
Libtaxii | Libtaxii project | 1 | Application |