Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Phex | Phex | 1 | Application |
Bp 60c45 firmware | Sharp | 10 | Operating system |
Bp 70c31 firmware | Sharp | 10 | Operating system |
Bp 70c36 firmware | Sharp | 10 | Operating system |
Bp 70c45 firmware | Sharp | 10 | Operating system |
Bp 70c55 firmware | Sharp | 10 | Operating system |
Bp 70c65 firmware | Sharp | 10 | Operating system |
Bp 70m31 firmware | Sharp | 10 | Operating system |
Bp 70m36 firmware | Sharp | 10 | Operating system |
Email2image | David alkire | 1 | Application |
Bp 70m45 firmware | Sharp | 10 | Operating system |
Bp 70m55 firmware | Sharp | 10 | Operating system |
Bp 70m65 firmware | Sharp | 10 | Operating system |
Bp 70m75 firmware | Sharp | 10 | Operating system |
Ga login | Google authenticator login project | 3 | Application |
Bp 70m90 firmware | Sharp | 10 | Operating system |
Beam | Apache | 2 | Application |
Mx 2630n firmware | Sharp | 10 | Operating system |
Mx 2651 firmware | Sharp | 10 | Operating system |
Boxes | Boxes project | 1 | Application |