Technology Vendor Vulnerability Posture

This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.
Vendor Name Number of Product Vulnerabilities Type
Dev l z 1 1 Application
Workforceroi 1 8 Application
Jasper jpeg 2000 1 1 Application
Lazy init project 1 1 Application
Commonwl 1 1 Application
Wolf18 1 1 Application
Unzip project 1 16 Application
Industrial softing 1 1 Operating System
Coala 1 1 Application
Elyazalee 1 1 Application
Iversemedia 1 1 Application
Pitivi 1 1 Application
Abine 2 3 Application
Dev pucit edu pk 3 3 Application
Mate desktop 4 5 Application
Babe logger 1 1 Application
Smashballoon 4 15 Application
Extcalendar 1 2 Application
Zipcar 1 1 Application
L0j1k 1 2 Application
Showing 20 of 38038 Results