Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Internment project | 1 | 2 | Application |
| F4dev | 1 | 2 | Application |
| Garyjohnson2012 | 1 | 1 | Application |
| Cpanel | 5 | 430 | Application |
| Wptrio | 2 | 5 | Application |
| Car rental system project | 1 | 1 | Application |
| Polycom | 86 | 140 | Hardware |
| Assaabloy | 6 | 6 | Operating System |
| Juniper project | 1 | 1 | Application |
| Bootstrap site alert project | 2 | 2 | Application |
| Spritesoftware | 2 | 2 | Application |
| Cpg nuke | 2 | 5 | Application |
| Shadan kun | 1 | 1 | Application |
| The isle evrima project | 1 | 1 | Application |
| Bytedeco | 1 | 1 | Application |
| Jsbroks | 1 | 1 | Application |
| Instant web mail | 1 | 1 | Application |
| Maiwei safety production control platform project | 1 | 3 | Application |
| Spirent | 1 | 1 | Hardware |
| Hima | 13 | 26 | Hardware |