Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Php | 24 | 779 | Application |
| Rlaj | 1 | 1 | Application |
| Ktauber | 1 | 1 | Application |
| Ultrasite | 1 | 1 | Application |
| Unix | 1 | 40 | Operating System |
| Pentaho | 4 | 6 | Application |
| Ga soft | 1 | 2 | Application |
| Askbot | 1 | 3 | Application |
| Fluidgames | 1 | 1 | Application |
| Govee | 1 | 2 | Hardware |
| Iportalis | 1 | 2 | Application |
| Opus codec | 1 | 1 | Application |
| Iwcn | 1 | 2 | Application |
| Webtorrent | 2 | 2 | Application |
| Johntp | 1 | 1 | Application |
| Motorola | 9 | 11 | Application |
| Liftweb | 1 | 1 | Application |
| Cordaware | 1 | 2 | Application |
| Outfront | 1 | 3 | Application |
| Renpho | 1 | 1 | Application |