Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
E mail newsletter management | Ec cube | 1 | Application |
Contact form by mega forms | Contact form by mega forms project | 1 | Application |
Mrd 315 firmware | Westermo | 1 | Operating system |
Home | Evoko | 2 | Application |
Backoffice | Microsoft | 2 | Application |
Bac a1616bc firmware | Kmccontrols | 1 | Operating system |
Auth2db | Auth2db | 1 | Application |
Splunk app for stream | Splunk | 1 | Application |
0 1 1 | Auth2dbauth2db | 1 | Application |
Postcalendar | Postnuke software foundation | 2 | Application |
Uhp 100 firmware | Uhp | 2 | Operating system |
Phpuploader | Phpuploader project | 2 | Application |
Arq backup | Haystacksoftware | 1 | Application |
Splunk app for lookup file editing | Splunk | 3 | Application |
Smartvista cardgen | Bpcbt | 2 | Application |
Proxysg va 10 | Bluecoat | 1 | Application |
Proxysg va 15 | Bluecoat | 1 | Application |
Proxysg va 20 | Bluecoat | 1 | Application |
Proxysg va 5 | Bluecoat | 1 | Application |
Proxysg | Bluecoat | 8 | Hardware |