Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Rowindex | 1 | 1 | Application |
| Geniusocean | 3 | 3 | Application |
| Fuse project | 1 | 2 | Application |
| Rockwellautomation | 88 | 480 | Application |
| Wancms | 1 | 1 | Application |
| Lucky9 | 1 | 1 | Application |
| Bekirk | 1 | 1 | Application |
| Tag project | 1 | 4 | Application |
| Coinlancer | 1 | 1 | Application |
| Readymadeb2bscript | 3 | 4 | Application |
| Cpa lead reward script project | 1 | 1 | Application |
| Hospira | 1 | 4 | Application |
| Fake magazine cover script project | 1 | 1 | Application |
| Arista | 26 | 180 | Operating System |
| Online exam test application project | 1 | 1 | Application |
| Bitcoincore | 1 | 3 | Application |
| Bitcoinknots | 1 | 4 | Application |
| Savsofteproducts | 1 | 1 | Application |
| Newsbeuter | 1 | 3 | Application |
| Rockwellautomation | 178 | 471 | Operating System |