Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Wipotec | 1 | 2 | Application |
| Fifu | 1 | 9 | Application |
| Kanaka | 2 | 5 | Application |
| Webhmi | 1 | 4 | Operating System |
| Saxon | 1 | 1 | Application |
| Cetic | 1 | 1 | Operating System |
| Adjam | 1 | 2 | Application |
| Raz lee | 1 | 1 | Application |
| 53x11 | 1 | 1 | Application |
| Opc ua stack project | 1 | 2 | Application |
| Modbuspal project | 1 | 1 | Application |
| Fahlstad | 2 | 2 | Application |
| Vincent blavet | 1 | 1 | Application |
| Dawningsoft | 1 | 1 | Application |
| Yootheme | 1 | 2 | Application |
| Enterprisedb | 2 | 10 | Application |
| Diagon project | 1 | 2 | Application |
| Game lion | 1 | 1 | Application |
| Gfos | 1 | 1 | Application |
| Checkinstall | 1 | 1 | Application |