Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Kirillmakarov | 1 | 2 | Application |
| Ehues | 1 | 1 | Application |
| Maheshpatel | 1 | 1 | Application |
| Hazelcast | 5 | 12 | Application |
| Iball | 5 | 9 | Operating System |
| Terminalfour | 2 | 6 | Application |
| Hashthemes | 4 | 12 | Application |
| Ftsafe | 4 | 4 | Hardware |
| Stop spam comments project | 1 | 1 | Application |
| Planet | 8 | 52 | Hardware |
| Kmonos | 1 | 1 | Application |
| La souris verte | 1 | 1 | Application |
| Secretcircle | 1 | 1 | Application |
| Access remote pc com | 1 | 1 | Application |
| Ebayclonescript | 1 | 2 | Application |
| Teachpress project | 1 | 1 | Application |
| Doapps | 1 | 1 | Application |
| Duncan hall | 1 | 1 | Application |
| Ewire | 1 | 1 | Application |
| Losant | 1 | 1 | Application |