Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
N150 wireless router | Belkin | 1 | Hardware |
N300 wireless router | Belkin | 1 | Hardware |
N450 wireless router | Belkin | 1 | Hardware |
Fileorganizer | Fileorganizer | 5 | Application |
Cups pk helper | Cups pk helper project | 1 | Application |
Prevent files folders access | Miniorange | 1 | Application |
Cross fetch | Cross fetch project | 1 | Application |
Dologin security | Wpdo5ea | 2 | Application |
Monorepo build | Monorepo build project | 1 | Application |
S3 kilatstorage | S3 kilatstorage project | 1 | Application |
Gawk | Gnu | 1 | Application |
Curljs | Curljs project | 1 | Application |
Node latex pdf | Node latex pdf project | 1 | Application |
Cookie law | Uplight | 1 | Application |
Gitblame | Gitblame project | 1 | Application |
Peprodev cf7 database | Peprodev | 2 | Application |
Heroku env | Heroku env project | 1 | Application |
Image tiler | Image tiler project | 1 | Application |
Nancy | Nancyfx | 1 | Application |
Npos tesseract | Npos tesseract project | 1 | Application |