Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Phicomm | 11 | 51 | Operating System |
| Utstarcom | 5 | 5 | Hardware |
| One news | 1 | 1 | Application |
| Desknets | 1 | 1 | Application |
| Thomas perez | 1 | 2 | Application |
| Wpsimplebookingcalendar | 1 | 4 | Application |
| Elevateico | 1 | 1 | Application |
| Rambus | 2 | 2 | Application |
| Web wiz | 3 | 4 | Application |
| Pt news | 1 | 1 | Application |
| Bostonsleep | 1 | 1 | Application |
| Uke project | 1 | 1 | Application |
| Phppost | 1 | 1 | Application |
| Kmint21 software | 1 | 7 | Application |
| Wefi | 1 | 1 | Application |
| Zteusa | 6 | 8 | Hardware |
| Kervancilar | 1 | 1 | Application |
| Broken link manager project | 1 | 1 | Application |
| Iptbb team | 1 | 1 | Application |
| Diego uscanga | 1 | 1 | Application |