Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
V14 are | Lenovo | 4 | Hardware |
V14 igl | Lenovo | 8 | Hardware |
V14 iil | Lenovo | 3 | Hardware |
V140 15iwl | Lenovo | 4 | Hardware |
V15 g1 iml | Lenovo | 7 | Hardware |
V15 g2 alc | Lenovo | 4 | Hardware |
V15 g2 itl | Lenovo | 7 | Hardware |
V15 ada | Lenovo | 4 | Hardware |
V15 igl | Lenovo | 8 | Hardware |
V15 iil | Lenovo | 3 | Hardware |
V17 g2 itl | Lenovo | 7 | Hardware |
V17 iil | Lenovo | 8 | Hardware |
V340 17iwl | Lenovo | 4 | Hardware |
Yoga 7 14acn6 | Lenovo | 2 | Hardware |
Yoga c940 14iil | Lenovo | 2 | Hardware |
Yoga slim 7 pro 14ach5 d | Lenovo | 3 | Hardware |
Yoga slim 7 pro 14ach5 | Lenovo | 3 | Hardware |
Yoga slim 7 pro 14ach5 o | Lenovo | 3 | Hardware |
Yoga slim 7 pro 14ach5 od | Lenovo | 3 | Hardware |
Yoga slim 7 pro 14arh5 | Lenovo | 3 | Hardware |