Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
J p grossman | 1 | 1 | Application |
Riceball | 1 | 2 | Application |
Moosikay e commerce system project | 1 | 1 | Application |
Proxifier | 1 | 2 | Application |
Kddi gree | 1 | 1 | Application |
Plogger | 1 | 10 | Application |
Fast browser | 1 | 1 | Application |
Open audit | 1 | 6 | Application |
Khanacademy | 1 | 3 | Application |
Nagvis | 1 | 8 | Application |
Echostar | 1 | 2 | Hardware |
Synology | 24 | 96 | Hardware |
Eparks | 1 | 1 | Hardware |
Simm comm | 1 | 2 | Application |
Brivo | 2 | 4 | Operating System |
Gemaire | 1 | 1 | Application |
Kadencewp | 4 | 32 | Application |
De marchi daniele | 1 | 1 | Application |
Nasa | 10 | 43 | Application |
Sandsprite | 1 | 1 | Application |