Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Fail2ban | Fail2ban | 9 | Application |
Plot | Jenkins | 2 | Application |
Becky internet mail | Rimarts | 2 | Application |
Build metrics | Jenkins | 3 | Application |
Theme demo import | Themely | 2 | Application |
Uptimed | Uptimed project | 1 | Application |
Rich text publisher | Jenkins | 1 | Application |
Canvas learning management service | Instructure | 2 | Application |
Project inheritance | Jenkins | 6 | Application |
Matrix reloaded | Jenkins | 2 | Application |
Nprinting designer | Qlik | 1 | Application |
Qlikview | Qlik | 3 | Application |
Extreme feedback panel | Jenkins | 1 | Application |
Tor | Tor project | 5 | Application |
Validating email parameter | Jenkins | 1 | Application |
Thinkbook 14 iml firmware | Lenovo | 3 | Operating system |
Thinkbook 14 iil firmware | Lenovo | 3 | Operating system |
Thinkbook 15 iil firmware | Lenovo | 3 | Operating system |
Thinkbook 15 iml firmware | Lenovo | 3 | Operating system |
Yoga c640 13iml lte firmware | Lenovo | 3 | Operating system |