Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Log4sh | Log4sh | 1 | Application |
Affiliate super assistent | Ifeelweb | 2 | Application |
Simpleproxy | Simpleproxy | 1 | Application |
Big store | Themehunk | 1 | Application |
Reusable blocks extended | Jeanbaptisteaudras | 1 | Application |
Wp page numbers | Jenst | 1 | Application |
Lotus instant messaging and web conferencing | Ibm | 1 | Application |
Windows 10 1511 | Microsoft | 40 | Operating system |
Windows 10 2004 | Microsoft | 38 | Operating system |
Wrq reflection for secure it windows server | Wrq | 2 | Application |
Hcl leap | Hcltech | 1 | Application |
Endpoint protection center | Symantec | 1 | Application |
Alibaba clone | Web development house | 1 | Application |
Com mytube | Rick estrada | 1 | Application |
Google xml sitemap for images | Digitalinspiration | 1 | Application |
Acu | Huawei | 2 | Hardware |
Ar 19 29 49 | Huawei | 4 | Hardware |
Ar g3 | Huawei | 1 | Hardware |
Guestbook | Jnmsolutions | 1 | Application |
I load | Radactive | 4 | Application |