Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Bearer auth | Fastify | 1 | Application |
Fast permission administration | Fast permissions administration project | 1 | Application |
Webex training | Cisco | 1 | Application |
Hatch | Alienwp | 1 | Application |
Documentum xcp | Emc | 3 | Application |
Stage file proxy | Stage file proxy project | 1 | Application |
Email security appliance firmeware | Cisco | 1 | Operating system |
Botcha | Botcha spam prevention project | 1 | Application |
Hawtjni | Redhat | 1 | Application |
Barracudadrive | Realtimelogic | 2 | Application |
Noise java | Noise java project | 3 | Application |
Continuous delivery automation | Hp | 1 | Application |
Toybox | Toybox project | 1 | Application |
Bestzip | Bestzip project | 1 | Application |
Backup exec continuous protection server | Symantec | 1 | Application |
Unified ip phone 8945 | Cisco | 3 | Hardware |
Analytics and location engine | Arubanetworks | 1 | Application |
Swift | Isode | 1 | Application |
Veritas application director | Symantec | 1 | Application |
Veritas cluster server | Symantec | 1 | Application |