Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Jan kybic | 1 | 2 | Application |
Bobcares | 1 | 1 | Application |
3m | 1 | 2 | Application |
Jzip | 1 | 1 | Application |
Noxen project | 1 | 1 | Application |
Man2html project | 1 | 2 | Application |
Blueshoes | 1 | 2 | Application |
Meross | 1 | 2 | Hardware |
Outtolunchproductions | 1 | 1 | Application |
Eliacom | 1 | 1 | Application |
Helpu | 5 | 6 | Application |
Alexandre amaral | 1 | 3 | Application |
Fine free file project | 1 | 1 | Application |
Joovii | 1 | 1 | Application |
Phonetrack | 1 | 1 | Application |
Phptree | 1 | 1 | Application |
Wp post columns project | 1 | 1 | Application |
Databank | 1 | 1 | Application |
Simbiotnetwork | 1 | 1 | Application |
Tiki | 2 | 90 | Application |