Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Permit to work | Sap | 1 | Application |
Crm abap insights management | Sap | 1 | Application |
Admin | Continew | 2 | Application |
Ipc diagnostics package | Beckhoff | 3 | Application |
Twincat bsd | Beckhoff | 4 | Operating system |
Mdp package | Beckhoff | 1 | Application |
Security antivirus firewall | Msoftplugins | 1 | Application |
Thunderbolt dock g2 | Hp | 1 | Hardware |
Etg150 | Elenos | 1 | Hardware |
Netweaver java | Sap | 1 | Application |
Dynamic featured image | Ankitpokhrel | 1 | Application |
Netiq advance authentication | Opentext | 6 | Application |
Solarview compact | Contec | 1 | Hardware |
A7000r | Zioncom | 1 | Hardware |
Geoportal toolkit | Hyperview | 2 | Application |
Datadiodex | Dataflowx | 1 | Application |
Zephyr project manager | Dylanjkotze | 7 | Application |
File manager | Mi | 1 | Application |
Drug | Deathbreak | 1 | Application |
Gutentor | Gutentor | 2 | Application |