Products and Softwares Maturity Index
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Product Name | Vendor Name | Number of CVE | Product Type |
---|---|---|---|
Beauty salon management system | Campcodes | 21 | Application |
Dkim milter | Dkim | 1 | Application |
Electric sheep | Scott draves | 2 | Application |
Mongoose | Mongoosejs | 3 | Application |
Jetik web | Jetik | 1 | Application |
Pagure | Redhat | 5 | Application |
Sofi webgui | Muskatli | 1 | Application |
C language server protocol | Dotnetfoundation | 1 | Application |
Computing for good s basic laboratory information system | Gatech | 3 | Application |
Core firmware | Taphome | 2 | Operating system |
Metasploit | Rapid7 | 17 | Application |
Openrat | Openrat | 1 | Application |
Bzflag server | Bzflag | 1 | Application |
Easyappointments | Easyappointments | 24 | Application |
Jooblog | Jooblog | 1 | Application |
Eventmesh | Apache | 1 | Application |
Java system identity server | Sun | 2 | Application |
Hotscripts clone | Greatclone | 1 | Application |
Vslider | Vibethemes | 1 | Application |
Opencall media platform | Hpe | 1 | Application |