Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Shopping cart | Interspire | 2 | Application |
K3s | K3s | 1 | Application |
Core m5 | Intel | 8 | Hardware |
Core m7 | Intel | 8 | Hardware |
Xeon | Intel | 8 | Hardware |
Insydeh2o | Insyde | 65 | Application |
Rich text editor | Summernote | 1 | Application |
Tdsql chitu | Tdsql chitu project | 1 | Application |
Jopenid | Jopenid project | 1 | Application |
X ui | Vaxilu | 1 | Application |
Redports | Redports project | 1 | Application |
Ac10 firmware | Tenda | 59 | Operating system |
Spring data mongodb | Vmware | 1 | Application |
Wuersch | Wuersch project | 1 | Application |
Peppermint | Peppermint | 4 | Application |
Proficy historian | Ge | 5 | Application |
Codeready linux builder eus | Redhat | 17 | Application |
Codeready linux builder eus for power little endian | Redhat | 4 | Application |
Java virtual machine | Oracle | 5 | Application |
Beegfs csi driver | Netapp | 4 | Application |