Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Borland interbase | Damian frizza | 1 | Application |
427bb | Fourtwosevenbb | 2 | Application |
Samtodo | Samtodo | 1 | Application |
Com jotloader | Joomla | 1 | Application |
Php address book | Php address book | 2 | Application |
Com simpleshop | Joomla | 1 | Application |
Easybook component | Joomla | 1 | Application |
Flashblog | Theflashblog | 1 | Application |
Flashblog | Flashblog | 1 | Application |
Cbrpager | Jcoppens | 1 | Application |
Client | Akamai technologies | 1 | Application |
Client | Red swoosh | 1 | Application |
Com idoblog | Joomla | 1 | Application |
Com equotes | Ron liskey | 1 | Application |
Com jb2 | Joomla | 1 | Application |
Com acctexp | Joomla | 1 | Application |
Com joomradio | Joomla | 1 | Application |
I pos internet pay online store | Bearrivernet net | 1 | Application |
Bitkinex | Barad dur | 1 | Application |
Linksys wrh54g router | Cisco | 1 | Hardware |