Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Mcl collection | 1 | 2 | Operating System |
| Python imaging project | 1 | 1 | Application |
| Shimmie2 project | 1 | 1 | Application |
| Caretakerr api project | 1 | 1 | Application |
| C blosc2 project | 1 | 6 | Application |
| National science foundation | 2 | 6 | Application |
| Zoomtel | 1 | 1 | Operating System |
| Openevidence | 1 | 1 | Application |
| Xtomo | 1 | 1 | Application |
| Telaum | 2 | 2 | Hardware |
| Ws scrcpy project | 1 | 1 | Application |
| Joomanager | 1 | 1 | Application |
| 2kblater | 1 | 2 | Application |
| Dynamic content elements project | 1 | 2 | Application |
| Alecto | 1 | 1 | Hardware |
| Xzgv | 1 | 1 | Application |
| Farmacia project | 1 | 12 | Application |
| Valvepress | 4 | 14 | Application |
| 4mosan | 1 | 2 | Application |
| Softbanktech | 1 | 1 | Application |