Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Presstigers | 4 | 14 | Application |
Web news | 1 | 1 | Application |
Amazon aws project | 1 | 1 | Application |
Morian | 1 | 1 | Application |
Tahiticlic | 1 | 1 | Application |
Webligo | 1 | 1 | Application |
Samsung | 370 | 606 | Hardware |
University of arizona | 2 | 3 | Application |
Gvnpatidar | 1 | 1 | Application |
Maxxmarketing | 1 | 1 | Application |
Joshua mediasoft | 2 | 2 | Application |
Simple log project | 1 | 2 | Application |
Custom sub menus project | 1 | 1 | Application |
Mktcoin | 1 | 1 | Application |
Sco | 13 | 199 | Operating System |
Thememylogin | 1 | 1 | Application |
Papermerge | 1 | 1 | Application |
Andys chat | 1 | 1 | Application |
Douphp | 1 | 1 | Application |
Expense management system project | 1 | 1 | Application |