Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Php5 common | Debian | 1 | Application |
Php5 | Canonical | 1 | Application |
Goodreader | Goodiware | 1 | Application |
Nhn japan naver line | Naver | 1 | Application |
Kde pim | Kde | 1 | Application |
Logol | Debian | 1 | Application |
Uplay pc | Ubi | 2 | Application |
Chef | Opscode | 3 | Application |
Suse audit log keeper | Novell | 1 | Application |
Arcsight logger appliance firmware | Hp | 1 | Operating system |
Arcsight logger appliance | Hp | 1 | Hardware |
Com rsgallery2 | Rsgallery2 | 3 | Application |
Breakingpoint storm appliance ctm | Breakingpointsystems | 2 | Operating system |
Breakingpoint storm appliance | Breakingpointsystems | 2 | Hardware |
Dir2web | Dir2web | 2 | Application |
Kindle touch | Amazon | 2 | Hardware |
Winwebmail server | Winwebmail | 1 | Hardware |
T day webmail | Tdah | 1 | Application |
Mailsuite pro | Afterlogic | 1 | Application |
Escon supportportal | E supportportal | 1 | Application |