Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Accomplishtechnology | 1 | 6 | Application |
Midasolutions | 1 | 7 | Application |
Viglen | 2 | 2 | Hardware |
Teamspeak | 5 | 11 | Application |
Phpmyrecipes project | 1 | 2 | Application |
Camp project | 1 | 1 | Application |
Magmacore | 1 | 2 | Application |
Jacob hinkle | 1 | 1 | Application |
5starplugins | 2 | 3 | Application |
Enterasys | 3 | 5 | Application |
Beautyntherep | 1 | 1 | Application |
Net ldap project | 1 | 2 | Application |
Aarboard | 1 | 1 | Application |
Employee daily task management system project | 1 | 1 | Application |
Pyopenssl | 1 | 3 | Application |
Lame project | 1 | 15 | Application |
Flvmeta | 1 | 2 | Application |
Identityautomation | 1 | 1 | Application |
Ryan davis | 1 | 1 | Application |
Blackfire | 1 | 1 | Application |