Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Lazysizes project | 1 | 1 | Application |
| Andrew charlton | 1 | 1 | Application |
| Parallelmafia | 1 | 1 | Application |
| In toto | 1 | 1 | Application |
| Plugin devs | 2 | 5 | Application |
| Demomentsomtres | 1 | 1 | Application |
| Jean christophe ramos | 2 | 3 | Application |
| Qcp | 1 | 1 | Operating System |
| Tesi | 1 | 1 | Application |
| Shizutetsu | 1 | 1 | Application |
| Etherpad | 3 | 19 | Application |
| Microstudio | 1 | 1 | Application |
| Tad uploader project | 1 | 2 | Application |
| Mailerlite | 2 | 5 | Application |
| Zhenfeng13 my blog project | 1 | 2 | Application |
| Health | 2 | 8 | Application |
| Is user valid project | 1 | 1 | Application |
| Commercial interactive media | 1 | 1 | Application |
| Siteman | 1 | 7 | Application |
| Nuserp | 1 | 4 | Application |