Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Cisco | 790 | 6666 | Application |
| Datto | 2 | 2 | Application |
| Icecast | 2 | 15 | Application |
| Baxter | 14 | 56 | Hardware |
| Bauc | 1 | 1 | Application |
| Wsn knowledge base | 1 | 1 | Application |
| Soft lite | 1 | 1 | Application |
| John albin | 1 | 1 | Application |
| Crafty social buttons project | 1 | 1 | Application |
| Realwebcare | 2 | 3 | Application |
| Olivethemes | 1 | 4 | Application |
| Pucit edu | 1 | 1 | Application |
| Social network project | 1 | 1 | Application |
| Djinnworks | 2 | 2 | Application |
| Eo video | 1 | 1 | Application |
| Neurotoken | 1 | 1 | Application |
| Iongroup | 1 | 1 | Application |
| Documalis | 2 | 2 | Application |
| Armassa | 1 | 2 | Application |
| Webaware | 1 | 1 | Application |