Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| N able | 4 | 12 | Application |
| Futures intrusive project | 1 | 1 | Application |
| Phpjabbers | 36 | 136 | Application |
| Image rs | 1 | 2 | Application |
| Xxyopen | 3 | 53 | Application |
| Pyo3 project | 1 | 2 | Application |
| Hakobaito | 1 | 1 | Application |
| Zlmediakit | 1 | 3 | Application |
| Net2 project | 1 | 1 | Application |
| Miow project | 1 | 1 | Application |
| Couchcms | 2 | 3 | Application |
| Acresso | 2 | 4 | Application |
| Mio project | 1 | 1 | Application |
| Brother | 377 | 1116 | Operating System |
| Ordered float project | 1 | 1 | Application |
| Landesk | 4 | 10 | Application |
| Try mutex project | 1 | 1 | Application |
| Magnetic project | 1 | 1 | Application |
| Dieboldnixdorf | 4 | 11 | Application |
| Nanorand project | 1 | 2 | Application |