Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Ht editor | 1 | 3 | Application |
| Yorba | 1 | 1 | Application |
| Autocms project | 1 | 3 | Application |
| Sammycage | 2 | 13 | Application |
| Pifzer | 3 | 12 | Hardware |
| Enttec | 4 | 19 | Hardware |
| Sanadata | 1 | 2 | Application |
| Dicshunary | 1 | 1 | Application |
| Itwitter project | 1 | 1 | Application |
| Adbglobal | 6 | 16 | Operating System |
| Webmedia explorer | 1 | 2 | Application |
| Luigi massa | 1 | 1 | Application |
| Mskocik | 1 | 1 | Application |
| Wpape | 1 | 1 | Application |
| Weave works | 1 | 1 | Application |
| Raven php scripts | 1 | 1 | Application |
| Landisgyr | 1 | 1 | Operating System |
| Proxytunnel | 1 | 2 | Application |
| Bloodshed software | 1 | 1 | Application |
| Icmp | 1 | 1 | Application |