Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Westes | 1 | 3 | Application |
Chia | 1 | 1 | Application |
Wp guestmap project | 1 | 1 | Application |
Insurance management system project | 1 | 16 | Application |
Bainternet | 1 | 2 | Application |
Luca app | 1 | 3 | Application |
Rulinalg project | 1 | 1 | Application |
Dcdcdcdcdc project | 1 | 1 | Application |
Amarok | 2 | 5 | Application |
Photography on the net | 1 | 2 | Application |
Xenomtechnologies | 1 | 1 | Application |
Hono | 2 | 6 | Application |
Admiror design studio | 2 | 5 | Application |
Aceboard | 1 | 1 | Application |
Addisgag | 1 | 1 | Application |
Arvidn | 1 | 1 | Application |
Marc melvin | 1 | 1 | Application |
Tiiwee | 1 | 1 | Hardware |
Openframe glslviewer project | 1 | 1 | Application |
B4after | 1 | 1 | Application |