Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Zihanggao | 1 | 1 | Application |
Steve228uk | 1 | 1 | Application |
Postorius project | 1 | 1 | Application |
Rainmachine | 2 | 4 | Hardware |
Ardupilot | 1 | 1 | Application |
Geutebrueck | 1 | 1 | Application |
Glpi project | 11 | 185 | Application |
Sudirman angriawan | 1 | 1 | Application |
Fudforum | 1 | 12 | Application |
Fantastic scripts | 1 | 0 | Application |
Home internet project | 1 | 1 | Application |
Mysimplenews | 1 | 3 | Application |
Humaxdigital | 3 | 9 | Operating System |
Secondline | 1 | 1 | Application |
Student grading system project | 1 | 4 | Application |
Browsercrm | 1 | 5 | Application |
Cratedb | 1 | 2 | Application |
Jcink com | 1 | 1 | Application |
Greenplum | 1 | 2 | Application |
Bic media widget plugin | 1 | 1 | Application |