Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Thinkbook plus g2 itg | Lenovo | 3 | Hardware |
Yoga 6 13alc6 | Lenovo | 1 | Hardware |
Yoga creator 7 15imh05 | Lenovo | 2 | Hardware |
Yoga slim 7 14are05 | Lenovo | 2 | Hardware |
Yoga slim 7 14iil05 | Lenovo | 2 | Hardware |
Yoga slim 7 14itl05 | Lenovo | 2 | Hardware |
Yoga slim 7 15iil05 | Lenovo | 2 | Hardware |
Yoga slim 7 15imh05 | Lenovo | 2 | Hardware |
Yoga slim 7 15itl05 | Lenovo | 2 | Hardware |
Yoga slim 7 carbon 13itl5 | Lenovo | 2 | Hardware |
Thinkpad x1 tablet gen 1 | Lenovo | 1 | Hardware |
F4 210 | Terra master | 6 | Hardware |
Cc612 | Bender | 8 | Hardware |
Cc613 | Bender | 8 | Hardware |
Icc15xx | Bender | 2 | Hardware |
Icc16xx | Bender | 2 | Hardware |
Mr9600 | Linksys | 1 | Hardware |
Lexmark | Lexmark | 1 | Hardware |
Mavic 3 | Dji | 1 | Hardware |
Rc pro | Dji | 1 | Hardware |