Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Mule enterprise management console | Mulesoft | 1 | Application |
Darkhttpd | Darkhttpd project | 0 | Application |
Incredible pbx 11 | Incrediblepbx | 1 | Application |
Tomb | Dyne | 1 | Application |
Openshift machine config operator | Redhat | 1 | Application |
Xprintserver | Lantronix | 2 | Hardware |
Doc path | Doc path project | 1 | Application |
Exuberant ctags | Exuberant ctags project | 1 | Application |
Controlled merge | Controlled merge project | 1 | Application |
Compact product suite | Abb | 1 | Application |
Vldpersonals | Vld interactive | 2 | Application |
Hermes | Harman | 8 | Application |
Ghinstallation | Ghinstallation project | 1 | Application |
Arcgis quickcapture | Esri | 2 | Application |
Quick app | Oppo | 1 | Application |
C2 webresource | C2enterprise | 1 | Application |
Tl wr940n v4 firmware | Tp link | 1 | Operating system |
Tigertext | Tigertext | 1 | Application |
Web labs cms | Web labs | 1 | Application |
Zxhn h108l firmware | Zte | 1 | Operating system |