Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Jesse web | 1 | 1 | Application |
Nomoketos rules | 1 | 1 | Application |
Newsletter | 1 | 1 | Application |
Auto upload images project | 1 | 4 | Application |
Apache | 1 | 1 | Operating System |
Carbon communities | 1 | 2 | Application |
Boatscripts | 1 | 1 | Application |
Kolja nolte | 1 | 1 | Application |
Inventory system project | 1 | 1 | Application |
Mikachu | 1 | 1 | Application |
Blogbuddies | 1 | 2 | Application |
Gibbon project | 1 | 1 | Application |
Solution scripts | 1 | 1 | Application |
Santiagosarceda | 1 | 1 | Application |
Top vision | 1 | 1 | Hardware |
Yappa ng | 1 | 3 | Application |
Gphotos | 1 | 3 | Application |
Jiacrontab project | 1 | 1 | Application |
Login disable project | 1 | 2 | Application |
Inhandnetworks | 5 | 81 | Operating System |