Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Spring security oauth | Pivotal software | 5 | Application |
Exiv2 | Exiv2 | 118 | Application |
Maccms | Maccms | 27 | Application |
Openpages grc platform | Ibm | 22 | Application |
Outlook express | Microsoft | 45 | Application |
Banking corporate lending | Oracle | 24 | Application |
Ryde | Rydesharing | 1 | Application |
Security identity governance and intelligence | Ibm | 40 | Application |
Nod32 antivirus | Eset | 29 | Application |
Emlog pro | Emlog pro project | 1 | Application |
Urbancode deploy | Ibm | 55 | Application |
Kaspersky internet security suite | Kaspersky lab | 1 | Application |
Exec local bin | Exec local bin project | 1 | Application |
Http file server | Http file server project | 1 | Application |
Pngwriter | Pngwriter project | 1 | Application |
Command line interface | Cloudfoundry | 2 | Application |
Pc2r firmware | Xovis | 3 | Operating system |
Norton internet security 2008 | Symantec | 1 | Application |
Vapor | Vapor | 7 | Application |
Pc3 firmware | Xovis | 3 | Operating system |