Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Mathtex | Ctan | 6 | Application |
Adapter node | Svelte | 1 | Application |
Kit | Svelte | 1 | Application |
Contiki ng tinydtls | Contiki ng | 1 | Operating system |
Lemmy | Join lemmy | 1 | Application |
Git server | Jenkins | 2 | Application |
Log command | Jenkins | 1 | Application |
Red hat dependency analytics | Jenkins | 1 | Application |
Trillium | Trillium | 1 | Application |
Trillium http | Trillium | 1 | Application |
Category discount woocommerce | Quanticedgesolutions | 1 | Application |
Websub | Pubsubhubbub | 1 | Application |
Ipcs | Splicecom | 1 | Application |
Ipcs2 | Splicecom | 1 | Application |
Maximiser soft pbx | Splicecom | 3 | Application |
Cups easy | Ajaysharma | 44 | Application |
Vector admin | Mintplexlabs | 1 | Application |
Mw5360 firmware | Netis systems | 1 | Operating system |
Qdbcrm | 100296 | 1 | Application |
Nvr 504 firmware | Systemk corp | 1 | Operating system |