Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Stephen adkins | 1 | 1 | Application |
| Jumpdemand | 2 | 6 | Application |
| Wpmapplugins | 1 | 2 | Application |
| Thememason | 1 | 2 | Application |
| Mofinetwork | 2 | 11 | Operating System |
| Dreameesoft | 1 | 1 | Application |
| Ati | 1 | 3 | Application |
| Larvata | 1 | 5 | Application |
| Wpguru | 1 | 1 | Application |
| Myapp | 3 | 3 | Application |
| Uniong | 1 | 11 | Application |
| Pam pgsql | 1 | 1 | Application |
| Ansible semaphore | 1 | 2 | Application |
| Madebytribe | 1 | 1 | Application |
| Maptools | 2 | 2 | Application |
| Weban | 1 | 1 | Application |
| Dgraph | 1 | 1 | Application |
| Addthis | 1 | 1 | Application |
| Imageoptim project | 1 | 1 | Application |
| Ion storm | 1 | 1 | Application |