Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Netsweeper | 1 | 19 | Application |
Idrix | 2 | 7 | Application |
Dapperdesk | 1 | 1 | Application |
Borbis | 1 | 2 | Application |
Shutter project | 1 | 2 | Application |
Gemalto | 3 | 3 | Hardware |
Git scm | 1 | 37 | Application |
As project | 1 | 1 | Application |
Palm | 1 | 2 | Application |
Zeroshell | 1 | 1 | Application |
Envothemes | 2 | 11 | Application |
Phpalbum net | 1 | 4 | Application |
Plainwaire | 1 | 5 | Application |
Sonicwall | 105 | 494 | Operating System |
Report project | 1 | 1 | Application |
Vaulteksafe | 1 | 2 | Operating System |
Mail project | 1 | 4 | Application |
Sponge news | 1 | 1 | Application |
Klarned | 1 | 1 | Application |
User photo | 1 | 1 | Application |