Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Gs1900 8 | Zyxel | 16 | Hardware |
Aim star | Reedos | 5 | Application |
Voc tester | Vidco | 1 | Application |
Autogpt | Agpt | 4 | Application |
Defectdojo | Owasp | 1 | Application |
Meraki systems manager | Cisco | 1 | Application |
Poly ccx 700 | Zoom | 1 | Hardware |
Poly ccx 600 | Zoom | 1 | Hardware |
Yealink vp59 | Zoom | 1 | Hardware |
Yealink mp54 | Zoom | 1 | Hardware |
Yealink mp56 | Zoom | 1 | Hardware |
2000 pm | Solar log | 1 | Hardware |
Precision 3420 | Dell | 6 | Hardware |
Latitude 13 3380 | Dell | 30 | Hardware |
Vijeo designer embedded in ecostruxure machine expert | Schneider electric | 1 | Application |
High definition audio bus driver | Microsoft | 1 | Application |
Dsl 3782 | Dlink | 17 | Hardware |
Ordat erp | Ordat | 3 | Application |
Myaac | Opentibiabr | 1 | Application |
Best free law office management | Mayurik | 1 | Application |