Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Pdjkeelan com | 1 | 1 | Application |
| Geovap | 2 | 3 | Application |
| Nicecoder | 2 | 7 | Application |
| Phpwordpress | 1 | 1 | Application |
| Ezinvoiceinc | 1 | 1 | Application |
| Fscripts | 1 | 5 | Application |
| Htc | 11 | 12 | Application |
| Claymore dual miner project | 1 | 3 | Application |
| Dragonflybsd | 1 | 6 | Operating System |
| Pingidentity | 21 | 57 | Application |
| Getkovri | 1 | 1 | Application |
| I2pd | 1 | 1 | Application |
| Serve lite project | 1 | 2 | Application |
| Brickhost | 1 | 5 | Application |
| Smartctl project | 1 | 1 | Application |
| Helecloud | 1 | 1 | Application |
| Opensuse project | 8 | 113 | Operating System |
| Pmwiki | 1 | 8 | Application |
| Simple git project | 1 | 4 | Application |
| Manageiq | 2 | 2 | Application |