Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Donation button project | 1 | 2 | Application |
Supervisord | 1 | 2 | Application |
Zitscher | 1 | 2 | Application |
Deep set project | 1 | 1 | Application |
E annu | 1 | 1 | Application |
Exceedone | 2 | 10 | Application |
Aurora | 1 | 1 | Application |
Toms seiten at | 1 | 1 | Application |
In4velocity | 1 | 1 | Application |
Posim | 1 | 2 | Application |
Mikel lindsaar | 1 | 1 | Application |
Robs projects | 3 | 3 | Application |
Jqlang | 1 | 10 | Application |
Gotribe | 2 | 2 | Application |
Dbbee | 1 | 1 | Application |
Dpsoft | 1 | 1 | Application |
Doctor appointment management system project | 1 | 4 | Application |
Fauzantrif election project | 1 | 2 | Application |
Btiteam | 2 | 14 | Application |
Spey | 1 | 3 | Application |