Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Pdjkeelan com | 1 | 1 | Application |
Geovap | 2 | 3 | Application |
Nicecoder | 2 | 7 | Application |
Phpwordpress | 1 | 1 | Application |
Ezinvoiceinc | 1 | 1 | Application |
Fscripts | 1 | 5 | Application |
Htc | 11 | 12 | Application |
Claymore dual miner project | 1 | 3 | Application |
Dragonflybsd | 1 | 6 | Operating System |
Pingidentity | 21 | 57 | Application |
Getkovri | 1 | 1 | Application |
I2pd | 1 | 1 | Application |
Serve lite project | 1 | 2 | Application |
Brickhost | 1 | 5 | Application |
Smartctl project | 1 | 1 | Application |
Helecloud | 1 | 1 | Application |
Opensuse project | 8 | 113 | Operating System |
Pmwiki | 1 | 8 | Application |
Simple git project | 1 | 4 | Application |
Manageiq | 2 | 2 | Application |