Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Webform validation | Svendecabooter | 1 | Application |
Social book facebook clone monster | Clonemonster | 1 | Application |
Video player | Sohu | 1 | Application |
Parameterized remote trigger | Jenkins | 1 | Application |
Cloudmusic | Netease | 1 | Application |
Database | Jenkins | 3 | Application |
Book borrower system | Rems | 0 | Application |
Passlogix v go self service password reset and oem | Oracle | 1 | Application |
Financial calculator | Systematica | 1 | Application |
Fix adapter | Systematica | 1 | Application |
Http adapter | Systematica | 1 | Application |
Mssql messagebus proxy | Systematica | 1 | Application |
Radius | Systematica | 1 | Application |
Smtp adapter | Systematica | 1 | Application |
Valgrind | Jenkins | 2 | Application |
Klocwork analysis | Jenkins | 1 | Application |
Jsherp | Huaxiaerp | 2 | Application |
Jsgames | Jenkins | 1 | Application |
Keepserverex | Ptc | 2 | Application |
Aes encryption module | Johan lindskog | 1 | Application |