Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Pluto lang | 1 | 2 | Application |
| Interactivebrokers | 1 | 1 | Application |
| Miniaudio project | 1 | 2 | Application |
| Bt | 3 | 6 | Hardware |
| Starfish | 2 | 6 | Application |
| Pierre jehan | 1 | 2 | Application |
| Wulkano | 1 | 1 | Application |
| Ubuntu | 5 | 90 | Operating System |
| Mysource cms | 1 | 1 | Application |
| Mkportal | 2 | 13 | Application |
| Geshi | 1 | 3 | Application |
| Jiran | 2 | 2 | Application |
| Controlbyweb | 6 | 7 | Hardware |
| Genesys | 6 | 7 | Application |
| Afterlogic | 8 | 17 | Application |
| Design nation | 1 | 1 | Application |
| Plptools | 1 | 1 | Application |
| Idm computer solutions inc | 1 | 1 | Application |
| Entitybulkdelete project | 1 | 1 | Application |
| Yoga class registration system project | 1 | 12 | Application |