Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Acekyd | 1 | 1 | Application |
Cicoandcico | 1 | 2 | Application |
Nerdico project | 1 | 1 | Application |
Redash | 1 | 5 | Application |
Galaxycoin project | 1 | 1 | Application |
Nukescripts | 1 | 6 | Application |
Nec | 99 | 254 | Operating System |
Web based student clearance system project | 1 | 11 | Application |
Random text project | 1 | 1 | Application |
Kapaycoin project | 1 | 1 | Application |
Nendeb | 3 | 3 | Application |
Fkgeo | 1 | 1 | Application |
Openslides | 1 | 7 | Application |
Sonar wrapper project | 1 | 1 | Application |
Snoopy | 1 | 5 | Application |
10quality | 1 | 1 | Application |
Id3lib | 1 | 1 | Application |
Spi inc | 1 | 3 | Application |
Wokkalokka | 1 | 1 | Operating System |
Penguinchefshop project | 1 | 1 | Application |