Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Job generator | Jenkins | 1 | Application |
Wp oauth2 server | Codexshaper | 1 | Application |
Validating string parameter | Jenkins | 1 | Application |
Node and label parameter | Jenkins | 1 | Application |
Computer queue | Jenkins | 1 | Application |
Dataease | Dataease project | 3 | Application |
Perfecto | Jenkins | 2 | Application |
Fuseiso | Fuseiso project | 2 | Application |
Radiator view | Jenkins | 1 | Application |
Publish over ftp | Jenkins | 2 | Application |
Custom job icon | Jenkins | 1 | Application |
Description column | Jenkins | 1 | Application |
Wg300hp firmware | Aterm | 1 | Operating system |
Mongodb | Jenkins | 2 | Application |
Wf800hp firmware | Aterm | 2 | Operating system |
Xiv storage system gen3 firmware | Ibm | 1 | Operating system |
Chosen views tabbar | Jenkins | 1 | Application |
Zenworks asset management | Novell | 3 | Application |
Clearcase release | Jenkins | 1 | Application |
Standard | Mutiny | 1 | Application |