Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Asksam systems | 1 | 2 | Application |
| Ivanweb | 1 | 2 | Application |
| Diskeeper | 1 | 1 | Application |
| Tricerasoft | 1 | 1 | Application |
| Diskoverdata | 1 | 3 | Application |
| Svgpp | 1 | 4 | Application |
| Fastream | 6 | 12 | Application |
| Wms project | 1 | 3 | Application |
| Crytek | 1 | 1 | Application |
| Gitea | 1 | 34 | Application |
| Contec | 26 | 97 | Hardware |
| Taskrabbit clone project | 1 | 1 | Application |
| Redcloth | 1 | 1 | Application |
| Vishnusivadas | 1 | 1 | Application |
| Catbot project | 1 | 1 | Application |
| Phpjabbers | 36 | 136 | Application |
| Wxjava project | 1 | 2 | Application |
| Wp admin logo changer project | 1 | 1 | Application |
| Kerio | 10 | 55 | Application |
| Najeebmedia | 11 | 38 | Application |