Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Web all | Webatall | 2 | Application |
Mosh | Keith winstein | 1 | Application |
Photosmart e all in one printer series | Hp | 1 | Hardware |
Photosmart estation all in one printer series | Hp | 1 | Hardware |
Photosmart ink advantage e all in one | Hp | 1 | Hardware |
Photosmart plus e all in one printer series | Hp | 1 | Hardware |
Photosmart premium fax e all in one printer series | Hp | 1 | Hardware |
Photosmart wireless e all in one printer series | Hp | 1 | Hardware |
Bcfg2 | Anl | 1 | Application |
Ip office customer call reporter | Avaya | 1 | Application |
Dtach | Redhat | 1 | Application |
Anaconda | Fedoraproject | 1 | Application |
Decoda | Milesj | 3 | Application |
Myclientbase | Myclientbase | 2 | Application |
Lan messenger1 2 28 | Lan messenger | 1 | Application |
Php pastebin | Atmoner | 1 | Application |
Captiva quickscan pro | Emc | 1 | Application |
Documentum applicationxtender desktop | Emc | 1 | Application |
Intelligent platforms proficy batch execution | Ge | 2 | Application |
Intelligent platforms proficy historian | Ge | 6 | Application |