Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Online traffic offense management system project | 1 | 5 | Application |
Landshop | 1 | 1 | Application |
Apparound | 1 | 1 | Application |
Farm9 | 1 | 1 | Application |
Car rental script project | 1 | 8 | Application |
Jasypt project | 1 | 1 | Application |
Markany | 1 | 1 | Application |
Pressified | 1 | 8 | Application |
Wp buy | 8 | 22 | Application |
Xv project | 1 | 1 | Application |
Sierrawireless | 47 | 325 | Hardware |
Mollensoft software | 3 | 4 | Application |
Ecies | 1 | 1 | Application |
Micco | 4 | 8 | Application |
Turuncu portal | 1 | 1 | Application |
Clansys | 1 | 4 | Application |
Michalin | 1 | 1 | Application |
Kingsoftstore | 2 | 2 | Application |
Rainbowfishsoftware | 1 | 7 | Application |
Objectcomputing | 3 | 12 | Application |