Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Slim 7 carbon 13iap7 | Lenovo | 5 | Hardware |
Slim 7 prox 14iah7 | Lenovo | 5 | Hardware |
Slim 9 14iap7 | Lenovo | 5 | Hardware |
Thinkbook 15p imh | Lenovo | 5 | Hardware |
V14 g2 ijl | Lenovo | 5 | Hardware |
V14 g3 iap | Lenovo | 5 | Hardware |
V15 g2 ijl | Lenovo | 5 | Hardware |
V15 g3 iap | Lenovo | 5 | Hardware |
V17 g3 iap | Lenovo | 5 | Hardware |
S540 13itl | Lenovo | 5 | Hardware |
Yoga 7 14ial7 | Lenovo | 5 | Hardware |
Yoga 7 16iah7 | Lenovo | 5 | Hardware |
Yoga 7 16iap7 | Lenovo | 5 | Hardware |
Yoga 7 14itl5 | Lenovo | 5 | Hardware |
Yoga 7 15itl5 | Lenovo | 5 | Hardware |
Yoga 9 14iap7 | Lenovo | 5 | Hardware |
Yoga slim 7 carbon 13iap7 | Lenovo | 5 | Hardware |
Yoga slim 7 pro 14iah7 | Lenovo | 5 | Hardware |
Yoga slim 7 pro 14iap7 | Lenovo | 5 | Hardware |
Yoga slim 7 prox 14iah7 | Lenovo | 5 | Hardware |