Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Agent server parameter | Jenkins | 2 | Application |
Honor 8 pro firmware | Huawei | 1 | Operating system |
Crx content package deployer | Jenkins | 4 | Application |
Network level service | Cisco | 7 | Application |
Identity portal | Symantec | 1 | Application |
Date parameter | Jenkins | 1 | Application |
Flink stateful functions | Apache | 1 | Application |
Hyper estraier | Hyper estraier | 2 | Application |
Dynamic extended choice parameter | Jenkins | 3 | Application |
Xerces c | Apache | 11 | Application |
Arconte aurea | Fujitsu | 5 | Application |
Berlin l21 firmware | Huawei | 2 | Operating system |
Berlin l21hn firmware | Huawei | 2 | Operating system |
Filesystem list parameter | Jenkins | 1 | Application |
Asp fast forum | 10 4 aps | 1 | Application |
Hidden parameter | Jenkins | 1 | Application |
Berlin l22 firmware | Huawei | 2 | Operating system |
Subdreamer | Subdreamer | 2 | Application |
Tetration analytics | Cisco | 2 | Application |
Berlin l22hn firmware | Huawei | 1 | Operating system |