Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Vulnerabilities.io, reclaim access to make changes.
Aikido Security
Sponsored
Aikido Security
Visit Website
Product Avatar Image
Vulnerabilities.io

By Vulnerabilities.io

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Vulnerabilities.io, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with Vulnerabilities.io?

Aikido Security
Sponsored
Aikido Security
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Vulnerabilities.io Reviews & Product Details

Vulnerabilities.io Media

Vulnerabilities.io Demo - Risks
Vulnerabilities.io risks page showing end of life packages, secrets identified and dependency vulnerabilities.
Vulnerabilities.io Demo - Project - Dependencies
A project within a repository - showing outdated dependencies with licensing considerations.
Vulnerabilities.io Demo - Project - Risks
A project within a repository - showing identified old dependencies, secrets, package vulnerabilities and out dated components.
Vulnerabilities.io Demo - End of Life Risk
An end of life dependency risk identified in a piece of software. Showing the component that is out of support.
Vulnerabilities.io Demo - Secrets Risk
A secret identified in a repositories source code.
Product Avatar Image

Have you used Vulnerabilities.io before?

Answer a few questions to help the Vulnerabilities.io community

Vulnerabilities.io Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Vulnerabilities.io for G2 to provide buying insight. Below are some alternatives with more reviews:

1
GitHub Logo
GitHub
4.7
(2,265)
GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.
2
GitLab Logo
GitLab
4.5
(860)
An open source web interface and source control platform based on Git.
3
Wiz Logo
Wiz
4.7
(747)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
4
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(303)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
5
SonarQube Logo
SonarQube
4.5
(125)
SonarQube is a code quality and vulnerability solution for development teams that integrates with CI/CD pipelines to ensure the software you produce is secure, reliable, and maintainable.
6
Snyk Logo
Snyk
4.5
(123)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
7
Mend.io Logo
Mend.io
4.3
(112)
Mend.io delivers the first AI native application security platform built for software created by both humans and machines. It empowers organizations to secure AI generated code and embedded AI components like models, agents, MCPs, and RAG pipelines. The unified platform brings together comprehensive capabilities including AI security, SAST, SCA, container scanning, and Mend Renovate providing development and security teams complete visibility into risks across their codebase. With AI powered remediation and prioritization workflows, teams are enabled to quickly resolve issues and reduce risk. With a simple, predictable price model, eliminating per-module costs and minimal reliance on expensive professional services Mend.io is a scalable, proactive, developer-friendly platform for modern AppSec—all in a single platform.
8
Cortex Cloud Logo
Cortex Cloud
4.1
(110)
Cloud to SOC security to protect cloud applications, data, and AI models across multicloud and hybrid environments by leveraging unified data and full-lifecycle context for real-time detection and response.
9
JFrog Logo
JFrog
4.2
(105)
The JFrog Platform is an end-to-end, hybrid, and universal binary-centric solution that continuously manages and secures your entire software supply chain from source to edge. We empower developers to be more efficient using JFrog’s services, Artifactory, Xray, Distribution, Pipelines, and Connect on a single unified platform. The JFrog Platform is an enterprise-grade solution that handles the scale of the largest development organizations in the world. The JFrog family of products includes: JFrog Artifactory: -Provides definitive artifact management for flexible development and trusted delivery at any scale. The industry leader. JFrog Xray: -The industry’s only DevOps-Centric Security solution offers protection across your supply chain and is integrated seamlessly with Artifactory and the other JFrog products for a single point of management and security. JFrog Pipelines: -Integrates with the leading CI/CD tools to manage all software pipelines in a single place with additional event triggers and easy-to-use templates. JFrog Distribution and JFrog PDN: -Creates trusted software releases and gets them where they need to be, fast. Handles the highest scale of throughput and consumption. JFrog Connect: -A comprehensive solution for updating, managing and monitoring software applications on Linux-based edge and IoT devices. JFrog Mission Control & Insights: -Enhances control over your JFrog Platform deployment with access to key metrics.
10
Aikido Security Logo
Aikido Security
4.6
(101)
Aikido Security is a developer-first software security platform. We scan your source code & cloud to show you which vulnerabilities are actually important to solve. Triaging is sped up by massively reducing false-positives and making CVEs human-readable. Aikido makes it simple to keep your product secure and gives you back time to do what youdo best: writing code.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.