Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Containers image project | 1 | 1 | Application |
| Citrusdb | 2 | 5 | Application |
| Checkmark | 2 | 2 | Application |
| Nasioc | 1 | 1 | Application |
| Butterfat | 1 | 2 | Application |
| Ajv | 1 | 1 | Application |
| Socks5 project | 1 | 1 | Application |
| Toni mueller | 1 | 1 | Application |
| Videotelecom | 1 | 1 | Application |
| Les vanbrunt | 1 | 1 | Application |
| Rad | 1 | 2 | Hardware |
| Aximediasoft | 1 | 1 | Application |
| Altrasoft | 1 | 1 | Application |
| Py2play | 1 | 1 | Application |
| Yourboard | 1 | 1 | Application |
| Node macaddress project | 1 | 1 | Application |
| Independent solution | 2 | 2 | Application |
| Pnotes net project | 1 | 1 | Application |
| Cybercash | 1 | 1 | Application |
| Infocus | 3 | 6 | Hardware |