Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Freelinking project | 1 | 1 | Application |
Mobile4social | 1 | 1 | Application |
Matthew general | 1 | 1 | Application |
Prochatrooms | 2 | 4 | Application |
Semper invicta fitness project | 1 | 1 | Application |
Jinwen | 2 | 2 | Application |
Stirlingpdf | 1 | 3 | Application |
Epikur | 1 | 3 | Application |
Rletech | 4 | 4 | Operating System |
Aruba | 1 | 1 | Application |
2code | 4 | 26 | Application |
Niceforyou | 1 | 4 | Hardware |
Cyclades | 1 | 3 | Application |
Thomas rybak | 2 | 2 | Application |
Wpajans | 1 | 1 | Application |
Z cash | 1 | 3 | Application |
Sy9 | 1 | 1 | Application |
Znc | 3 | 19 | Application |
Tionetworks | 1 | 1 | Application |
Recruit | 2 | 2 | Application |