Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Custom login redirect | Custom login redirect project | 1 | Application |
82599en firmware | Intel | 2 | Operating system |
82599eb firmware | Intel | 2 | Operating system |
Current book | Current book project | 1 | Application |
82599es firmware | Intel | 2 | Operating system |
Wonder video embed | Wonderplugin | 2 | Application |
Supportezzy ticket system | Supportezzy ticket system project | 1 | Application |
Wonder pdf embed | Wonderplugin | 1 | Application |
Eleanor cms | Eleanor cms | 2 | Application |
Graphics performance analyzers | Intel | 8 | Application |
Mimetic books | Mimetic | 1 | Application |
Jungle sdk | Realtek | 2 | Application |
Management engine bios extension | Intel | 1 | Application |
Core i3 firmware | Intel | 1 | Operating system |
Realtek jungle sdk | Realtek | 3 | Application |
Core i3 8100 firmware | Intel | 1 | Operating system |
Core i3 8100f firmware | Intel | 1 | Operating system |
Core i3 8100t firmware | Intel | 1 | Operating system |
Newscmslite | Katy whitton | 1 | Application |
Core i3 8300 firmware | Intel | 1 | Operating system |