Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Winability | 1 | 2 | Application |
Icegram | 6 | 47 | Application |
Openbook book data project | 1 | 1 | Application |
Mailpress project | 1 | 1 | Application |
First4internet xcp drm | 1 | 1 | Application |
Wp sentry project | 1 | 1 | Application |
Roundup tracker | 1 | 14 | Application |
Qualcomm | 14 | 55 | Application |
Wp post styling project | 1 | 1 | Application |
Phpgroupware | 1 | 27 | Application |
Parsedown | 1 | 2 | Application |
Tiny contact form project | 1 | 1 | Application |
Phpsysinfo | 1 | 7 | Application |
Rotating posts project | 1 | 1 | Application |
Cimy header image rotator project | 1 | 1 | Application |
Greg roelofs | 3 | 13 | Application |
Armemberplugin | 1 | 5 | Application |
Adbglobal | 6 | 16 | Operating System |
Fatcatapps | 7 | 13 | Application |
University of kansas | 1 | 6 | Application |