Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Stargate bukkit project | 1 | 1 | Application |
Namelessmc | 1 | 2 | Application |
Idnovate | 2 | 2 | Application |
Shiromuku | 2 | 2 | Application |
Timersys | 2 | 5 | Application |
Gapi cms | 1 | 1 | Application |
Armemberplugin | 1 | 5 | Application |
Denkgroot | 1 | 4 | Application |
Holoborodko | 1 | 2 | Application |
Gmace project | 1 | 3 | Application |
Wp hijri project | 1 | 1 | Application |
Himpfen consulting | 1 | 1 | Application |
Komoot | 1 | 2 | Application |
Nfsv4 | 1 | 1 | Application |
Ntlmaps | 1 | 1 | Application |
Chainer | 1 | 1 | Application |
Subtlewebinc | 1 | 1 | Application |
A10networks | 1 | 6 | Operating System |
Ignite realtime | 1 | 6 | Application |
Milboj | 1 | 1 | Application |