Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Acftp | 1 | 3 | Application |
Cxuu | 1 | 8 | Application |
Revolut | 1 | 1 | Application |
Gorul | 1 | 1 | Application |
Jesse web | 1 | 1 | Application |
Nomoketos rules | 1 | 1 | Application |
Newsletter | 1 | 1 | Application |
Auto upload images project | 1 | 3 | Application |
Carbon communities | 1 | 2 | Application |
Kolja nolte | 1 | 1 | Application |
Boatscripts | 1 | 1 | Application |
Inventory system project | 1 | 1 | Application |
Mikachu | 1 | 1 | Application |
Blogbuddies | 1 | 2 | Application |
Gibbon project | 1 | 1 | Application |
Solution scripts | 1 | 1 | Application |
Santiagosarceda | 1 | 1 | Application |
Top vision | 1 | 1 | Hardware |
Yappa ng | 1 | 3 | Application |
Gphotos | 1 | 3 | Application |