Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Hoermann | 3 | 3 | Operating System |
Net dns | 1 | 2 | Application |
Alisonic | 1 | 1 | Operating System |
Xxyopen | 3 | 44 | Application |
Campcodes advanced online voting system project | 1 | 3 | Application |
Matez | 1 | 1 | Application |
Josema enzo | 1 | 1 | Application |
Canon its | 1 | 1 | Application |
Knplabs | 1 | 2 | Application |
Lightsaml | 1 | 1 | Application |
Gunet | 1 | 4 | Application |
Radware | 2 | 3 | Application |
Tendacn | 25 | 221 | Operating System |
7 habits personal development project | 1 | 1 | Application |
Elliptic human presence detection device driver for lenovo | 1 | 1 | Application |
Weaviate | 1 | 1 | Application |
University of washington | 12 | 40 | Application |
Lightmeter | 1 | 1 | Application |
Xmlsec project | 1 | 2 | Application |
Secutech project | 3 | 3 | Operating System |