Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Operation bridge manager | Microfocus | 3 | Application |
Firmware | Sonicwall | 1 | Hardware |
Elm | Elm development group | 7 | Application |
Service manager automation | Microfocus | 2 | Application |
Elm me | Elmme mailer | 1 | Application |
Sitemonitor | Jenkins | 2 | Application |
Coverage complexity scatter plot | Jenkins | 2 | Application |
Mailsweeper | Clearswift limited | 2 | Application |
Tests selector | Jenkins | 2 | Application |
Konker platform | Konker | 1 | Application |
Jabber im | Cisco | 1 | Application |
Data transfer project | 1 | Application | |
Abyss web server | Aprelium technologies | 10 | Application |
Netbackup appliance | Symantec | 1 | Hardware |
Ezmeeting | Ezmeeting | 1 | Application |
Enterprise vault for file system archiving | Symantec | 1 | Application |
Perfetto | 1 | Application | |
Fitelnet | Furukawa electric | 1 | Hardware |
Mucho ev pk | Furukawa electric | 1 | Hardware |
Storwize | Ibm | 1 | Application |