Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Midnight commander | 1 | 2 | Application |
Internet sofware sciences | 1 | 1 | Application |
Wordquest | 1 | 2 | Application |
Reactos | 1 | 1 | Operating System |
The merchant project | 1 | 1 | Application |
Ionizecms | 1 | 4 | Application |
Personal net portal | 1 | 1 | Application |
Web platform tests | 1 | 1 | Application |
Sk typo3 | 1 | 2 | Application |
Wfchat | 1 | 1 | Application |
Bab technologie | 1 | 7 | Operating System |
Mediaticus | 1 | 2 | Application |
Alhem | 1 | 1 | Application |
Sdl | 2 | 3 | Application |
Lepton project | 1 | 6 | Application |
Ninjakiwi | 1 | 1 | Application |
Arraynetworks | 2 | 6 | Operating System |
Braincert | 2 | 2 | Application |
Helpcenterlive | 3 | 3 | Application |
Besavvy | 1 | 1 | Application |