Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Performance maximizer | Intel | 1 | Application |
Rover idx | Roveridx | 2 | Application |
Teplobot | Te st | 1 | Application |
News kit elementor addons | Blazethemes | 2 | Application |
Category and taxonomy meta fields | Aftabhusain | 3 | Application |
Superb 3 | Skoda auto | 3 | Hardware |
Pc10g cpu tcc 6353 | Jtekt | 4 | Hardware |
Pc10ge tcc 6464 | Jtekt | 4 | Hardware |
Pc10p tcc 6372 | Jtekt | 4 | Hardware |
Pc10p dp tcc 6726 | Jtekt | 4 | Hardware |
Pc10p dp io tcc 6752 | Jtekt | 4 | Hardware |
Pc10b p tcc 6373 | Jtekt | 4 | Hardware |
Pc10b tcc 1021 | Jtekt | 4 | Hardware |
Pc10e tcc 4737 | Jtekt | 3 | Hardware |
Pc10el tcc 4747 | Jtekt | 2 | Hardware |
Plus cpu tcc 6740 | Jtekt | 4 | Hardware |
Pc3jx tcc 6901 | Jtekt | 2 | Hardware |
Pc3jx d tcc 6902 | Jtekt | 2 | Hardware |
Pc10pe tcc 1101 | Jtekt | 3 | Hardware |
Pc10pe 1616p tcc 1102 | Jtekt | 3 | Hardware |