Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Generex | 1 | 1 | Application |
Newtone | 1 | 1 | Application |
Monocms | 1 | 6 | Application |
Deplate | 1 | 1 | Application |
Wickedplugins | 1 | 21 | Application |
Timesheets for jira | 1 | 1 | Application |
Iconics | 13 | 79 | Application |
Kallidan | 1 | 1 | Application |
Vimeo video autoplay automute project | 1 | 1 | Application |
Audiocodes | 20 | 45 | Operating System |
Ikarus | 2 | 22 | Application |
Dlc solutions | 1 | 1 | Application |
All around cyprus project | 1 | 1 | Application |
Extraputty | 1 | 1 | Application |
Good | 1 | 3 | Application |
Themevolty | 8 | 9 | Application |
Hot linked image cacher project | 1 | 1 | Application |
Domoticz | 2 | 4 | Application |
Celerondude | 1 | 1 | Application |
Deltaww | 12 | 16 | Operating System |