Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Adenion | 1 | 19 | Application |
| Pcfreetime | 1 | 1 | Application |
| Ticketed lock project | 1 | 1 | Application |
| Boschrexrothag | 3 | 3 | Application |
| Recordnrip | 1 | 1 | Application |
| Lightdm gtk greeter project | 1 | 1 | Application |
| Comus | 1 | 1 | Application |
| Far php | 1 | 1 | Application |
| Ip com | 2 | 20 | Operating System |
| Targem games | 1 | 1 | Application |
| Midnight commander | 1 | 2 | Application |
| Internet sofware sciences | 1 | 1 | Application |
| Wordquest | 1 | 2 | Application |
| Reactos | 1 | 1 | Operating System |
| The merchant project | 1 | 1 | Application |
| Ionizecms | 1 | 4 | Application |
| Personal net portal | 1 | 1 | Application |
| Web platform tests | 1 | 1 | Application |
| Sk typo3 | 1 | 2 | Application |
| Wfchat | 1 | 1 | Application |