Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Xrms | 1 | 5 | Application |
| Conti | 1 | 3 | Application |
| Telenav | 1 | 1 | Application |
| Dazuko | 1 | 1 | Application |
| Elijahharry | 1 | 1 | Application |
| Transtek | 1 | 4 | Application |
| Mini pub | 1 | 5 | Application |
| Makedp | 1 | 1 | Application |
| Poweriso | 1 | 5 | Application |
| Veilid | 1 | 1 | Application |
| Tiempo | 1 | 3 | Application |
| Honda | 4 | 4 | Hardware |
| Codefuse | 1 | 1 | Application |
| Parontalli project | 1 | 1 | Application |
| Iopus | 1 | 1 | Application |
| Serveryaozeyan project | 1 | 1 | Application |
| Grapecity | 1 | 1 | Application |
| Steelcase | 1 | 3 | Operating System |
| Alex rabe | 1 | 2 | Application |
| Ejointech | 3 | 3 | Hardware |