Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Youtag | 2 | 2 | Application |
Jirafeau | 1 | 9 | Application |
Arab portal | 1 | 5 | Application |
Softnext | 1 | 1 | Operating System |
Goliath project | 1 | 1 | Application |
Fluidsynth | 1 | 1 | Application |
Alykoshin | 1 | 1 | Application |
Altair | 2 | 5 | Application |
Crawlerdetect project | 1 | 1 | Application |
Csv2wpec coupon project | 1 | 1 | Application |
Puppets place | 1 | 1 | Application |
100plugins | 1 | 2 | Application |
Cisco | 790 | 6630 | Application |
Datto | 2 | 2 | Application |
Icecast | 2 | 15 | Application |
Baxter | 14 | 56 | Hardware |
Bauc | 1 | 1 | Application |
Wsn knowledge base | 1 | 1 | Application |
Soft lite | 1 | 1 | Application |
John albin | 1 | 1 | Application |