Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Gunhillwireless | 1 | 1 | Application |
| Brightsign | 1 | 3 | Operating System |
| Reachfargps | 1 | 1 | Hardware |
| Aladdin knowledge systems | 2 | 5 | Application |
| Guralp | 1 | 1 | Application |
| Switcherapi | 1 | 1 | Application |
| Ehud gavron | 2 | 5 | Application |
| Darrennathanael | 1 | 1 | Application |
| Oldmoon | 1 | 1 | Application |
| Scootersoftware | 1 | 3 | Application |
| Martinicreations | 1 | 1 | Application |
| Booking wp plugin | 1 | 7 | Application |
| Wpbackpack | 1 | 1 | Application |
| Linear | 1 | 3 | Application |
| Billing system project | 1 | 4 | Application |
| Ysoft | 1 | 4 | Application |
| Hanwha security | 1 | 3 | Application |
| Ftpdmin project | 1 | 2 | Application |
| Dreampics | 1 | 1 | Application |
| Ecommercemax | 1 | 1 | Application |