Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Nova 106 eyk300f001 | Sauter controls | 2 | Hardware |
Modunet300 ey am300f001 | Sauter controls | 2 | Hardware |
Modunet300 ey am300f002 | Sauter controls | 2 | Hardware |
Tapo c200 v1 | Tp link | 1 | Hardware |
D330 10igl | Lenovo | 2 | Hardware |
Ideapad 5 pro 16iah7 | Lenovo | 1 | Hardware |
Ideapad 5 pro 16arh7 | Lenovo | 2 | Hardware |
Ideapad duet 3 10igl5 | Lenovo | 3 | Hardware |
Slim 7 16arh7 | Lenovo | 2 | Hardware |
Thinkbook 15p imp | Lenovo | 1 | Hardware |
Ideapad slim 7 14iil05 | Lenovo | 1 | Hardware |
Ideapad slim 7 14itl05 | Lenovo | 1 | Hardware |
Ideapad slim 7 15iil05 | Lenovo | 1 | Hardware |
Thinkbook 14 g2 are | Lenovo | 1 | Hardware |
Thinkbook 14 g2 itl | Lenovo | 1 | Hardware |
Thinkbook 14 g3 acl | Lenovo | 1 | Hardware |
Thinkbook 14 g4 ara | Lenovo | 2 | Hardware |
Thinkbook 14 g4 iap | Lenovo | 2 | Hardware |
Thinkbook 14p g3 arh | Lenovo | 1 | Hardware |
Thinkbook 14s yoga itl | Lenovo | 1 | Hardware |