Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Nicehash | 2 | 4 | Application |
| Bittacora | 1 | 1 | Application |
| Bonoestente | 1 | 1 | Application |
| Editeurscripts | 5 | 6 | Application |
| Handysoft | 3 | 4 | Application |
| Acidcat | 2 | 9 | Application |
| Phiewer | 1 | 1 | Application |
| Kevin a gordon | 1 | 1 | Application |
| Ombi | 1 | 1 | Application |
| Mitsu hiro hi rose | 1 | 1 | Application |
| Chaogic systems | 1 | 1 | Application |
| Red5 | 1 | 1 | Application |
| Troyef | 1 | 1 | Application |
| Gslideshow project | 1 | 1 | Application |
| Node latex pdf project | 1 | 1 | Application |
| Sisplet cms | 1 | 1 | Application |
| Misterpark | 3 | 3 | Application |
| Metago | 1 | 1 | Application |
| Predic8 | 1 | 1 | Application |
| Consulo | 1 | 1 | Application |