Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Techtime | 1 | 1 | Application |
Zirkon box | 1 | 2 | Application |
Jmash | 1 | 2 | Application |
Free | 7 | 17 | Operating System |
Advertisementmanager | 1 | 2 | Application |
Mon project | 1 | 1 | Application |
Celoxis | 1 | 1 | Application |
Ourphp | 1 | 3 | Application |
Opticam | 2 | 40 | Operating System |
Content copy protection prevent image save project | 1 | 1 | Application |
Sagernet | 1 | 1 | Application |
Drachtio | 1 | 6 | Application |
Wyrestorm | 1 | 3 | Hardware |
Lcds | 1 | 24 | Application |
Osinet | 1 | 1 | Application |
Getkirby | 4 | 36 | Application |
Pintsized | 1 | 1 | Application |
Watersweb shops | 1 | 2 | Application |
Opendarwin | 1 | 3 | Operating System |
Karrigell | 1 | 1 | Application |