Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Accessguardian | Canon its | 1 | Application |
Network configurator for devicenet safety | Omron | 1 | Application |
Bk2site | Jose m vidal | 1 | Application |
Vpn 3015 concentrator | Cisco | 9 | Hardware |
Vpn 3020 concentrator | Cisco | 5 | Hardware |
Vpn 3030 concentator | Cisco | 9 | Hardware |
Vpn 3060 concentrator | Cisco | 9 | Hardware |
Pippo | Pippo | 5 | Application |
Initramfs tools | Debian | 1 | Application |
Vpn 3080 concentrator | Cisco | 9 | Hardware |
Traffic director | Oracle | 3 | Application |
Datafreedom perl | Pilot qof | 1 | Application |
Curl | Curl | 4 | Application |
Enigmail | Enigmail | 14 | Application |
Dropbox | Dropbox | 5 | Application |
Unistim ip phone | Nortel | 1 | Hardware |
Knowage | Knowage suite | 4 | Application |
Vpn 3005 concentrator software | Cisco | 5 | Operating system |
Vpn 3030 concentator | Cisco | 3 | Operating system |
Pix asa ids | Cisco | 2 | Application |