Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Maximize | 1 | 2 | Application |
Ansys | 1 | 20 | Application |
Hkurl | 1 | 1 | Application |
Pam extern | 1 | 1 | Application |
Verbatim | 5 | 16 | Operating System |
Sysend js project | 1 | 1 | Application |
Hitachienergy | 23 | 100 | Application |
Joyent | 1 | 14 | Operating System |
Bg tek | 8 | 8 | Operating System |
Pronestor | 2 | 2 | Application |
Phpaddedit | 1 | 2 | Application |
Stage file proxy project | 1 | 2 | Application |
Admin lte theme project | 1 | 1 | Application |
Tropicalm | 1 | 1 | Application |
Travelmap | 1 | 1 | Application |
Pluck cms | 2 | 48 | Application |
Hotcgiscripts | 1 | 1 | Application |
Gesslergmbh | 1 | 2 | Hardware |
Brandon tallent | 1 | 1 | Application |
Peter astrand | 1 | 2 | Application |