Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Dragonflybsd | 1 | 6 | Operating System |
Parso project | 1 | 1 | Application |
Howyar | 1 | 1 | Application |
Iterative | 1 | 1 | Application |
Nickmomrik | 1 | 1 | Application |
Vadesecure | 1 | 3 | Application |
Distributed checksum clearinghouse | 1 | 2 | Application |
Comment guestbook project | 1 | 1 | Application |
Hbwsl | 1 | 1 | Application |
Maroyaka relay novel project | 1 | 1 | Application |
Lightbend | 8 | 20 | Application |
Boesch it consulting | 2 | 3 | Application |
Powerphlogger | 1 | 3 | Application |
Crowdnext project | 1 | 2 | Application |
Battlefront | 1 | 3 | Application |
About me project | 1 | 1 | Application |
Henleythemes | 1 | 1 | Application |
Commerce view receipt project | 1 | 1 | Application |
Xpand it | 2 | 6 | Application |
Rockwellautomation | 84 | 466 | Application |