Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Air war hero project | 1 | 1 | Application |
Tivo | 1 | 2 | Application |
Moreconvert | 1 | 5 | Application |
Exeter | 1 | 1 | Application |
Peepso | 1 | 17 | Application |
Farahkharrat | 1 | 1 | Application |
Simple gmail login | 2 | 2 | Application |
The sleuth kit | 1 | 1 | Application |
Automated solutions | 1 | 1 | Application |
Wpplugins | 2 | 8 | Application |
Simplog | 1 | 14 | Application |
Verizon | 7 | 21 | Hardware |
Scriptonite | 1 | 3 | Application |
Lodelgeraldo | 1 | 1 | Application |
Audiofile | 1 | 14 | Application |
Qdbm | 1 | 1 | Application |
Cjbi | 1 | 4 | Application |
Quickbox | 1 | 5 | Application |
Pyres | 1 | 3 | Operating System |
Winged gallery | 1 | 1 | Application |