Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Iss | 18 | 54 | Application |
Shopware | 3 | 62 | Application |
Blazethemes | 3 | 6 | Application |
Workdo | 1 | 2 | Application |
Makina corpus | 1 | 2 | Application |
Mkethtoken project | 1 | 1 | Application |
Tokenmachu project | 1 | 1 | Application |
Nrl navy | 1 | 1 | Application |
Coalescent systems | 1 | 2 | Application |
Dgnews | 1 | 2 | Application |
Geniuscyber | 1 | 1 | Application |
Acme labs | 3 | 13 | Application |
Kimai2 project | 1 | 9 | Application |
Canarymail | 1 | 1 | Application |
Hummerrisk | 1 | 1 | Application |
Nxlog | 2 | 4 | Application |
Nobreak technologies | 1 | 2 | Application |
Kratosdefense | 2 | 3 | Hardware |
Mystats | 1 | 3 | Application |
Global centre | 1 | 1 | Application |