Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Laposta | 1 | 1 | Application |
| Cerebrate project | 1 | 10 | Application |
| Taismartfactory | 1 | 1 | Application |
| Rstinstruments | 29 | 29 | Hardware |
| Identityserver | 2 | 3 | Application |
| Zwaply | 1 | 1 | Application |
| Mod access referer | 1 | 1 | Application |
| Themefic | 4 | 22 | Application |
| Erp project | 1 | 4 | Application |
| P book | 1 | 1 | Application |
| Claws mail | 3 | 9 | Application |
| Lightbox photo gallery project | 1 | 1 | Application |
| Gaoxuyan project | 1 | 1 | Application |
| Xyplex | 1 | 1 | Hardware |
| Focus sis | 1 | 2 | Application |
| Count per day project | 1 | 4 | Application |
| Hzeller | 1 | 2 | Application |
| Matthias hopf | 1 | 1 | Application |
| K7computing | 14 | 143 | Application |
| Faplanet project | 1 | 1 | Application |