Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Webhmi | Iconics | 1 | Application |
Locked files report | Jenkins | 1 | Application |
Eaglesoft | Patterson dental | 2 | Application |
Elastest | Jenkins | 3 | Application |
Copy data to workspace | Jenkins | 1 | Application |
Libsocialweb | Gnome | 2 | Application |
Cmsimple | Cmsimple | 6 | Application |
Eva animator | Sharp | 1 | Application |
Easyio cpt graphics | Johnsoncontrols | 1 | Application |
Rhncfg | Redhat | 1 | Application |
Cryptsetup | Cryptsetup project | 3 | Application |
Hubzilla | Hubzilla | 3 | Application |
Ibooks author | Apple | 1 | Application |
Jcore | Jcore | 2 | Application |
Pd065 firmware | Wizplat | 1 | Operating system |
Wisepoint authenticator | Falconsc | 1 | Application |
Roothub | Roothub | 1 | Application |
Django rest framework | Django rest framework | 2 | Application |
Beyond compare | Scootersoftware | 3 | Application |
Api gateway | Broadcom | 1 | Application |