Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Roxyfileman | 1 | 6 | Application |
Ggnome | 1 | 2 | Application |
Cassianetworks | 2 | 2 | Operating System |
Tradesoft | 1 | 1 | Application |
Cronosys | 1 | 1 | Application |
Termpkg project | 1 | 1 | Application |
Linkwechat | 1 | 1 | Application |
Sihd bk | 1 | 1 | Application |
Gatsbyjs | 2 | 6 | Application |
Intelimen | 1 | 1 | Application |
Martinmbithi | 1 | 1 | Application |
Horse market sell rent portal project | 1 | 1 | Application |
Frontiersoftware | 1 | 2 | Application |
Jan kybic | 1 | 2 | Application |
Bobcares | 1 | 1 | Application |
3m | 1 | 2 | Application |
Jzip | 1 | 1 | Application |
Noxen project | 1 | 1 | Application |
Man2html project | 1 | 2 | Application |
Blueshoes | 1 | 2 | Application |