Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Winability | 1 | 2 | Application |
| Icegram | 6 | 61 | Application |
| Openbook book data project | 1 | 1 | Application |
| Mailpress project | 1 | 1 | Application |
| First4internet xcp drm | 1 | 1 | Application |
| Wp sentry project | 1 | 1 | Application |
| Roundup tracker | 1 | 15 | Application |
| Qualcomm | 14 | 57 | Application |
| Wp post styling project | 1 | 1 | Application |
| Phpgroupware | 1 | 27 | Application |
| Parsedown | 1 | 2 | Application |
| Tiny contact form project | 1 | 1 | Application |
| Phpsysinfo | 1 | 7 | Application |
| Rotating posts project | 1 | 1 | Application |
| Cimy header image rotator project | 1 | 1 | Application |
| Greg roelofs | 3 | 13 | Application |
| Armemberplugin | 1 | 5 | Application |
| Adbglobal | 6 | 16 | Operating System |
| Fatcatapps | 8 | 25 | Application |
| University of kansas | 1 | 6 | Application |