Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Server web monitor page | Server web monitor page project | 1 | Application |
Media ixt | Inktomi | 1 | Application |
Traffic edge | Inktomi | 1 | Application |
Wp user switch | Wp user switch project | 2 | Application |
Traffic server | Inktomi | 1 | Application |
Arborator server | Arborator server project | 1 | Application |
Bibtex | Bibtex | 1 | Application |
Apartment search script | Yourfreeworld | 3 | Application |
Realjukebox 2 | Realnetworks | 2 | Application |
Hue bridge v2 firmware | Philips | 1 | Operating system |
Closure library | 1 | Application | |
Realjukebox 2 plus | Realnetworks | 2 | Application |
Ctfd | Ctfd | 3 | Application |
Better errors | Better errors project | 1 | Application |
Air filemanager | Thomas waggershauser | 1 | Application |
Inn | Suse | 2 | Application |
Python apt | Ubuntu | 2 | Application |
Dcdgooglemap | David cadu | 1 | Application |
Python apt | Debian | 2 | Application |
Adobe content server | Adobe | 3 | Application |