Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Thinkbook 15 g2 are | Lenovo | 1 | Hardware |
Thinkbook 15 g2 itl | Lenovo | 1 | Hardware |
Thinkbook 15 g3 acl | Lenovo | 1 | Hardware |
Thinkbook 15 g3 itl | Lenovo | 1 | Hardware |
Thinkbook 15 g4 aba | Lenovo | 1 | Hardware |
Thinkbook 15p g2 ith | Lenovo | 7 | Hardware |
Thinkbook 16 g4 ara | Lenovo | 2 | Hardware |
Thinkbook 16 g4 iap | Lenovo | 2 | Hardware |
Thinkbook 16p g3 arh | Lenovo | 2 | Hardware |
Thinkbook 16p nx arh | Lenovo | 2 | Hardware |
Thinkbook plus g3 iap | Lenovo | 2 | Hardware |
Yoga duet 7 13iml05 | Lenovo | 2 | Hardware |
Yoga duet 7 13itl6 | Lenovo | 2 | Hardware |
Yoga duet 7 13itl6 lte | Lenovo | 2 | Hardware |
Yoga slim 7 pro 16arh7 | Lenovo | 2 | Hardware |
Cx944 | Lexmark | 10 | Hardware |
Mx432 | Lexmark | 10 | Hardware |
Mx931 | Lexmark | 10 | Hardware |
Xc4342 | Lexmark | 10 | Hardware |
Xc4352 | Lexmark | 10 | Hardware |