Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Mohsinrasool | 3 | 5 | Application |
Afichet | 1 | 1 | Application |
Mr cgi guy | 5 | 6 | Application |
Yosoro project | 1 | 1 | Application |
Etoshop | 3 | 4 | Application |
Bootboxjs | 1 | 1 | Application |
Phpfreebies com | 1 | 1 | Application |
Nori gem project | 1 | 1 | Application |
Haskell | 4 | 4 | Application |
Aitangbao | 1 | 10 | Application |
Daniyalahmedk | 1 | 2 | Application |
Zmodo | 2 | 4 | Hardware |
Proscend | 20 | 28 | Hardware |
Zetacomponents | 1 | 1 | Application |
Myoffice | 1 | 1 | Application |
Simple photo gallery project | 1 | 2 | Application |
Heartland payment systems | 1 | 1 | Application |
Xinuos | 2 | 2 | Operating System |
Sing4g | 1 | 1 | Hardware |
Tomatocms | 1 | 7 | Application |