Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Latitude 3540 | Dell | 4 | Hardware |
Latitude 5280 | Dell | 51 | Hardware |
Latitude 5288 | Dell | 43 | Hardware |
Latitude 5290 | Dell | 53 | Hardware |
Latitude 5290 2 in 1 | Dell | 50 | Hardware |
Latitude 5300 | Dell | 55 | Hardware |
Latitude 5300 2 in 1 | Dell | 51 | Hardware |
Latitude 5310 | Dell | 58 | Hardware |
Latitude 5310 2 in 1 | Dell | 53 | Hardware |
Latitude 5320 | Dell | 48 | Hardware |
Latitude 5330 | Dell | 33 | Hardware |
Latitude 5340 firmware | Dell | 2 | Operating system |
Latitude 5340 | Dell | 2 | Hardware |
Latitude 5400 | Dell | 58 | Hardware |
Latitude 5401 | Dell | 54 | Hardware |
Latitude 5410 | Dell | 57 | Hardware |
Latitude 5411 | Dell | 60 | Hardware |
Latitude 5414 rugged | Dell | 16 | Hardware |
Latitude 5420 | Dell | 49 | Hardware |
Latitude 5420 rugged | Dell | 48 | Hardware |