Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Dnspod | 1 | 2 | Application |
Rahnemaco | 1 | 2 | Application |
Berkeley softworks | 1 | 1 | Application |
Evergreencontentposter | 1 | 1 | Application |
Jath pala | 1 | 1 | Application |
Polarssl | 1 | 15 | Application |
Gizmo5 | 1 | 1 | Application |
Prettylinks | 1 | 2 | Application |
Juan toledo | 1 | 1 | Application |
Xinet | 1 | 1 | Application |
Bpsoft | 1 | 3 | Application |
Lavasoft | 1 | 1 | Application |
Emerson | 11 | 25 | Hardware |
Calarepasoftware | 1 | 1 | Application |
Indianpulses | 1 | 2 | Application |
Joomlaapps | 2 | 2 | Application |
Newstatpress project | 1 | 10 | Application |
Marathon aleph one | 1 | 2 | Application |
Bo blog | 1 | 1 | Application |
Typestack class validator project | 1 | 1 | Application |