Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Philipwalton | 1 | 1 | Application |
Prof uis | 1 | 1 | Application |
Newlog | 1 | 1 | Application |
Lightspeedhq | 1 | 8 | Application |
Jovelstefan | 1 | 1 | Application |
Libid3tag project | 1 | 2 | Application |
Acumos | 1 | 1 | Application |
Kieranoshea | 1 | 2 | Application |
Views bulk operations project | 1 | 4 | Application |
Phpscriptlerim | 1 | 1 | Application |
Securecomputing | 9 | 15 | Hardware |
Candlepinproject | 1 | 4 | Application |
Food ordering website project | 1 | 1 | Application |
Webmaster tools verification project | 1 | 1 | Application |
Werewolf online project | 1 | 1 | Application |
Barracuda | 14 | 19 | Operating System |
Sqla yaml fixtures project | 1 | 1 | Application |
Add post url project | 1 | 1 | Application |
Omeka | 2 | 14 | Application |
Linuxfoundation | 85 | 469 | Application |