Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Ree6 | 1 | 2 | Application |
| Susu sum project | 1 | 1 | Application |
| Xunfeng project | 1 | 2 | Application |
| Jlike project | 1 | 1 | Application |
| Auto login new user after registration project | 1 | 2 | Application |
| Inova software | 1 | 2 | Application |
| Webftp | 1 | 1 | Application |
| Yii2 statemachine | 1 | 1 | Application |
| Excalidraw | 1 | 2 | Application |
| Vscripts pl | 1 | 2 | Application |
| Wss | 1 | 1 | Application |
| Danialhatami | 2 | 2 | Application |
| Node ipc project | 1 | 1 | Application |
| Deutschepost | 1 | 1 | Application |
| Charity foundation script project | 1 | 1 | Application |
| Eosio project | 1 | 2 | Application |
| Sige | 1 | 1 | Application |
| Nuphoto | 1 | 1 | Application |
| Ardawan | 1 | 1 | Application |
| Pedro castro | 1 | 1 | Application |