Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Facade | 1 | 3 | Application |
Phpoutsourcing | 3 | 23 | Application |
Thedevoice | 1 | 1 | Application |
Idseq | 1 | 1 | Application |
Psappdeploytoolkit | 1 | 1 | Application |
Cryptopro | 1 | 2 | Application |
Donation button project | 1 | 2 | Application |
Supervisord | 1 | 2 | Application |
Zitscher | 1 | 2 | Application |
Deep set project | 1 | 1 | Application |
E annu | 1 | 1 | Application |
Exceedone | 2 | 10 | Application |
Aurora | 1 | 1 | Application |
Toms seiten at | 1 | 1 | Application |
In4velocity | 1 | 1 | Application |
Posim | 1 | 2 | Application |
Mikel lindsaar | 1 | 1 | Application |
Robs projects | 3 | 3 | Application |
Jqlang | 1 | 10 | Application |
Gotribe | 2 | 2 | Application |