Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Spotify play button | Followingmedarling | 2 | Application |
Thinkpad x250 broadwell | Lenovo | 2 | Hardware |
Thinkpad x250 sharkbay | Lenovo | 2 | Hardware |
Thinkpad x260 | Lenovo | 18 | Hardware |
Blog manager light | Otwthemes | 1 | Application |
Thinkpad yoga 11e | Lenovo | 9 | Hardware |
Thinkpad yoga 11e beema | Lenovo | 2 | Hardware |
Thinkpad yoga 11e braswell | Lenovo | 2 | Hardware |
Thinkpad yoga 11e broadwell | Lenovo | 2 | Hardware |
Permalinks customizer | Yasglobalizer | 1 | Application |
Thinkpad yoga 11e skylake | Lenovo | 2 | Hardware |
Thinkpad yoga 14 460 s3 | Lenovo | 3 | Hardware |
Thinkpad yoga 260 s1 | Lenovo | 2 | Hardware |
Urvanov syntax highlighter | Urvanov | 1 | Application |
Vpn | Softether | 9 | Application |
Mr8300 firmware | Linksys | 1 | Operating system |
Honda firmware | Honda | 1 | Operating system |
Nissan firmware | Nissan | 1 | Operating system |
Kia firmware | Kia | 1 | Operating system |
Hyundai firmware | Hyundai | 1 | Operating system |