Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Dreamcost | 2 | 5 | Application |
Qaulcomm | 1 | 1 | Hardware |
Next engine | 1 | 1 | Application |
Galeracluster | 2 | 2 | Application |
Kaazing | 1 | 1 | Application |
Joomgallery project | 1 | 1 | Application |
Myspotcam | 2 | 4 | Hardware |
Telebidauctionscript | 1 | 1 | Application |
Geneko | 4 | 4 | Hardware |
Tcpdf project | 1 | 11 | Application |
Smihica | 1 | 1 | Application |
Jaf cms | 1 | 1 | Application |
Basilix | 1 | 7 | Application |
Wptaskforce | 2 | 7 | Application |
Edush maxim | 1 | 1 | Application |
Fastest json copy project | 1 | 1 | Application |
Netchat | 1 | 1 | Application |
Ztehome | 1 | 2 | Operating System |
Cassandra rs project | 1 | 1 | Application |
Blackberry | 23 | 89 | Application |