Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Koeniglich | 1 | 1 | Application |
Datataker | 2 | 2 | Operating System |
Ms analysis | 1 | 1 | Application |
Matt kimball and roger wolff | 1 | 2 | Application |
Jamit | 1 | 2 | Application |
Amunak | 1 | 1 | Application |
Cobblerd | 1 | 18 | Application |
Dext5 | 3 | 6 | Application |
Subscribe to comments reloaded project | 1 | 1 | Application |
Ztml | 1 | 3 | Application |
Xt commerce | 3 | 7 | Application |
Yubico | 19 | 21 | Hardware |
Cross linker project | 1 | 1 | Application |
Oreilly | 5 | 11 | Application |
Commerce balanced payments project | 1 | 2 | Application |
Webhost automation | 2 | 6 | Application |
Annabansaghi | 1 | 1 | Application |
Codenameone | 1 | 1 | Application |
Bestweather project | 1 | 4 | Application |
Miliaris | 1 | 3 | Application |