Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Batch cat project | 1 | 1 | Application |
Catalyst | 1 | 1 | Application |
Awstats | 1 | 25 | Application |
Likeshop | 1 | 6 | Application |
Mollie | 1 | 3 | Application |
Domphp | 1 | 6 | Application |
Swim team project | 1 | 1 | Application |
Scripts for sites | 18 | 18 | Application |
Vaerys dawn | 1 | 2 | Application |
Real estate management software | 1 | 1 | Application |
Networkice | 1 | 1 | Application |
Franklinfueling | 2 | 11 | Operating System |
Page list project | 1 | 1 | Application |
Apostrophecms | 2 | 11 | Application |
Lycheeorg | 1 | 6 | Application |
Parisholley | 1 | 1 | Application |
Reservit | 1 | 1 | Application |
Balanced | 1 | 1 | Application |
App1pro | 1 | 1 | Application |
Semgrep | 1 | 1 | Application |