Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Tzinfo project | 1 | 1 | Application |
| Json c project | 1 | 2 | Application |
| Carlos eduardo sotelo pinto | 1 | 1 | Application |
| Mer vin | 1 | 1 | Application |
| Booksbyraven | 1 | 1 | Application |
| Massimo chioni | 1 | 1 | Application |
| Wpb show core project | 1 | 6 | Application |
| Remotelyanywhere | 1 | 1 | Application |
| Thiago melo de paula | 1 | 2 | Application |
| Neojoomla | 2 | 3 | Application |
| Aikcms | 1 | 5 | Application |
| Theethereumlottery | 2 | 2 | Application |
| Couponaffiliates | 1 | 1 | Application |
| Devil | 1 | 1 | Application |
| Floriangaerber | 1 | 1 | Application |
| Serverhuwenhui project | 1 | 1 | Application |
| Hospital management system project | 1 | 61 | Application |
| Fanuc | 26 | 35 | Operating System |
| Applika | 1 | 3 | Application |
| Android processing development environment project | 1 | 1 | Application |