Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Updir | 1 | 1 | Application |
Jsp mysql administrador web project | 1 | 2 | Application |
Uhp | 1 | 2 | Operating System |
Loginizer | 1 | 8 | Application |
Internet software solutions | 1 | 3 | Application |
Gesio | 1 | 1 | Application |
Appdynamics | 3 | 3 | Application |
Git archive project | 1 | 1 | Application |
Vspanel | 1 | 2 | Application |
Radiothermostat | 2 | 2 | Hardware |
Raspberrytorte | 1 | 1 | Application |
Wildfly | 1 | 1 | Application |
Viewpoint | 1 | 1 | Application |
Tracker software | 4 | 214 | Application |
Gogits | 1 | 3 | Application |
Wpjobboard | 1 | 3 | Application |
Openshift origin controller project | 1 | 1 | Application |
Europeana | 1 | 6 | Application |
Apowersoft | 1 | 1 | Application |
Unisoft | 1 | 2 | Application |