Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Latitude 3540 | Dell | 5 | Hardware |
Latitude 5280 | Dell | 54 | Hardware |
Latitude 5288 | Dell | 47 | Hardware |
Latitude 5290 | Dell | 57 | Hardware |
Latitude 5290 2 in 1 | Dell | 54 | Hardware |
Latitude 5300 | Dell | 58 | Hardware |
Latitude 5300 2 in 1 | Dell | 54 | Hardware |
Latitude 5310 | Dell | 62 | Hardware |
Latitude 5310 2 in 1 | Dell | 57 | Hardware |
Latitude 5320 | Dell | 51 | Hardware |
Latitude 5330 | Dell | 35 | Hardware |
Latitude 5340 firmware | Dell | 4 | Operating system |
Latitude 5340 | Dell | 4 | Hardware |
Latitude 5400 | Dell | 62 | Hardware |
Latitude 5401 | Dell | 57 | Hardware |
Latitude 5410 | Dell | 61 | Hardware |
Latitude 5411 | Dell | 64 | Hardware |
Latitude 5414 rugged | Dell | 17 | Hardware |
Latitude 5420 | Dell | 52 | Hardware |
Latitude 5420 rugged | Dell | 51 | Hardware |