Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Raiseitsolutions | 1 | 1 | Application |
Tooltipy | 1 | 1 | Application |
Intelligent vending systems | 1 | 1 | Application |
Stani | 1 | 1 | Application |
Controlsystemworks | 1 | 2 | Application |
Wp meteor | 1 | 2 | Application |
Matthias graubner | 1 | 1 | Application |
Subrion | 1 | 2 | Application |
Steveklabnik | 1 | 1 | Application |
Oskarshamnsliv project | 1 | 1 | Application |
Moosegallery | 1 | 1 | Application |
Ibphoenix | 1 | 1 | Application |
Flightcrew project | 1 | 3 | Application |
Foxit | 6 | 600 | Application |
Gimmie project | 1 | 3 | Application |
Unisoon | 1 | 3 | Operating System |
Puntolatinoclub | 1 | 1 | Application |
Hawking technology | 2 | 2 | Hardware |
Martin stover | 1 | 2 | Application |
Libxmljs project | 1 | 3 | Application |