Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Sandh | 1 | 1 | Application |
| Alex linde | 1 | 1 | Application |
| Motor racing league project | 1 | 1 | Application |
| Ada | 2 | 6 | Application |
| Greenecosystem | 1 | 1 | Application |
| Poly | 11 | 33 | Operating System |
| Hyperview | 1 | 2 | Application |
| Chama cargo | 1 | 1 | Application |
| Freedesktop | 23 | 172 | Application |
| Ihji | 1 | 1 | Application |
| Element plus | 1 | 2 | Application |
| Wp oauth | 1 | 3 | Application |
| Fileutils project | 1 | 1 | Application |
| Webfactoryltd | 14 | 29 | Application |
| Logichunt | 2 | 9 | Application |
| Mongodb instance project | 1 | 1 | Application |
| Amadercode | 1 | 1 | Application |
| Tweet blender | 1 | 1 | Application |
| Funlabs | 9 | 18 | Application |
| Nadeo | 3 | 3 | Application |