Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Maygion | 1 | 2 | Operating System |
Devalcms | 1 | 3 | Application |
Jimmac | 1 | 1 | Application |
Fuzzball muck | 1 | 1 | Application |
Cmseasy | 1 | 20 | Application |
Deep cms | 1 | 1 | Application |
Frontend uploader project | 1 | 2 | Application |
Tellurian | 1 | 1 | Application |
Tipask | 1 | 1 | Application |
Todesk | 1 | 2 | Application |
V creator com | 1 | 1 | Application |
Mwm | 1 | 2 | Application |
Akeles | 1 | 2 | Application |
Yii2 jqgrid widget project | 1 | 1 | Application |
Six apart ltd | 1 | 2 | Application |
Broadcastboxes | 1 | 1 | Hardware |
Beeline | 2 | 4 | Hardware |
Gestionaleopen | 1 | 1 | Application |
Webrtc experiment | 1 | 1 | Application |
Simplemachines | 3 | 30 | Application |