Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Bonoestente | 1 | 1 | Application |
Editeurscripts | 5 | 6 | Application |
Handysoft | 3 | 4 | Application |
Acidcat | 2 | 9 | Application |
Phiewer | 1 | 1 | Application |
Kevin a gordon | 1 | 1 | Application |
Ombi | 1 | 1 | Application |
Mitsu hiro hi rose | 1 | 1 | Application |
Chaogic systems | 1 | 1 | Application |
Red5 | 1 | 1 | Application |
Troyef | 1 | 1 | Application |
Gslideshow project | 1 | 1 | Application |
Node latex pdf project | 1 | 1 | Application |
Sisplet cms | 1 | 1 | Application |
Misterpark | 3 | 3 | Application |
Metago | 1 | 1 | Application |
Predic8 | 1 | 1 | Application |
Consulo | 1 | 1 | Application |
Netresearch | 1 | 1 | Application |
Amazon link project | 1 | 1 | Application |