Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Iscsitarget | 1 | 2 | Application |
| Petershaw | 1 | 1 | Application |
| Inspire ircd | 1 | 5 | Application |
| Indionetworks | 6 | 13 | Operating System |
| Sphider | 1 | 14 | Application |
| Sixnet | 2 | 2 | Application |
| Falko timme and till brehm | 1 | 1 | Application |
| Fredriksoerlie | 1 | 1 | Application |
| Peter proell | 2 | 2 | Application |
| Slack chat project | 1 | 1 | Application |
| Swfupload project | 1 | 2 | Application |
| Wp championship project | 1 | 2 | Application |
| Myeventon | 3 | 27 | Application |
| Plexcor | 1 | 1 | Application |
| Simplr registration form plus project | 1 | 1 | Application |
| Premmerce | 4 | 10 | Application |
| Gestdown | 1 | 1 | Application |
| Nexaweb | 2 | 4 | Application |
| Rd media | 2 | 2 | Application |
| Hunkaray duyuru | 1 | 1 | Application |