Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Gt db vn | Aiphone | Hardware | |
Ac1200 v w15ev2 | Tenda | Hardware | |
Secure firewall 3105 | Cisco | Hardware | |
Genoa | Amd | Hardware | |
Hygon 1 | Amd | Hardware | |
Hygon 2 | Amd | Hardware | |
Hygon 3 | Amd | Hardware | |
Milan | Amd | Hardware | |
Rome | Amd | Hardware | |
Snowy owl r1000 | Amd | Hardware | |
Snowy owl r2000 | Amd | Hardware | |
Snowy owl v2000 | Amd | Hardware | |
Snowy owl v3000 | Amd | Hardware | |
Alder lake | Intel | Hardware | |
Bakerville | Intel | Hardware | |
Cedar island | Intel | Hardware | |
Idaville | Intel | Hardware | |
Comet lake s | Intel | Hardware | |
Tiger lake h up3 | Intel | Hardware | |
Denverton | Intel | Hardware |