Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Candlepinproject | 1 | 4 | Application |
Food ordering website project | 1 | 1 | Application |
Webmaster tools verification project | 1 | 1 | Application |
Werewolf online project | 1 | 1 | Application |
Sqla yaml fixtures project | 1 | 1 | Application |
Barracuda | 14 | 19 | Operating System |
Omeka | 2 | 14 | Application |
Add post url project | 1 | 1 | Application |
Linuxfoundation | 85 | 469 | Application |
Aziot | 1 | 1 | Hardware |
Imwheel | 1 | 1 | Application |
Egerie | 1 | 1 | Application |
Plainviewplugins | 2 | 4 | Application |
Tamparongj 03 | 1 | 16 | Application |
Devnath verma | 2 | 5 | Application |
Pivx | 2 | 3 | Application |
Forms project | 1 | 2 | Application |
Ultra shareware | 1 | 2 | Application |
Lightning | 1 | 3 | Application |
Tomahawk technologies | 1 | 1 | Application |