Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Biteship | 1 | 3 | Application |
| Krischan jodies | 1 | 1 | Application |
| Pcmerge | 1 | 1 | Hardware |
| Hotdog project | 1 | 2 | Application |
| Adalis | 1 | 1 | Application |
| Pivotal | 38 | 52 | Application |
| Awesome | 2 | 2 | Application |
| Gulpjs | 2 | 3 | Application |
| Inventory management system project | 1 | 14 | Application |
| Fltk project | 1 | 3 | Application |
| Lksctp | 2 | 4 | Application |
| Elecsyscorp | 1 | 1 | Operating System |
| Ponzu cms | 1 | 1 | Application |
| Trim off newlines project | 1 | 1 | Application |
| Assaabloy | 3 | 14 | Application |
| Browserify | 3 | 3 | Application |
| Modoboa | 3 | 16 | Application |
| Seportal | 1 | 1 | Application |
| Steve j baker | 1 | 2 | Application |
| Botbait project | 1 | 1 | Application |