Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Larsens calendar project | 1 | 1 | Application |
| The hyakugo bank | 1 | 1 | Application |
| Martin pitt | 1 | 1 | Application |
| Roger lopez | 1 | 1 | Application |
| Chartered accountant booking script project | 1 | 1 | Application |
| Deltek | 3 | 3 | Application |
| Cujo | 1 | 1 | Operating System |
| Codedesign | 1 | 1 | Application |
| Boostmyshop | 1 | 1 | Application |
| Innovaphone | 1 | 1 | Operating System |
| Funnymonkey | 1 | 1 | Application |
| Aibattle project | 1 | 2 | Application |
| Memorizeit | 1 | 1 | Application |
| Apa | 2 | 2 | Application |
| Avenirsoft | 1 | 1 | Application |
| Joomla research | 1 | 1 | Application |
| Wordcraft project | 1 | 1 | Application |
| Elkagroup | 2 | 5 | Application |
| Jvckenwood | 1 | 29 | Operating System |
| Cgmlarson | 1 | 1 | Application |