Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Bluetrace | 1 | 1 | Application |
Wpbakery page builder clipboard project | 1 | 9 | Application |
Fatpipeinc | 3 | 18 | Operating System |
Core apps | 9 | 9 | Application |
Katadigital | 1 | 1 | Hardware |
Inoideas | 1 | 2 | Application |
Ask com | 1 | 2 | Application |
K2 | 1 | 1 | Application |
Smartsearchwp | 1 | 4 | Application |
Bakery online ordering system project | 1 | 4 | Application |
Carlinkit | 1 | 4 | Application |
Eshopbuilder | 1 | 1 | Application |
Uoregon | 1 | 2 | Application |
Emca | 1 | 1 | Application |
Reqmgr2 project | 1 | 1 | Application |
Indiatimes messenger | 1 | 1 | Application |
Mysqljs | 1 | 1 | Application |
Tim soderstrom | 1 | 1 | Application |
Easy file sharing ftp server project | 1 | 2 | Application |
Jpeg | 3 | 18 | Application |