Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Built2go | 4 | 4 | Application |
| Tug | 4 | 23 | Application |
| Bluboo d3 pro project | 1 | 1 | Hardware |
| Beaconmedaes | 1 | 3 | Hardware |
| Arcowave systems | 1 | 1 | Hardware |
| Ps kill project | 1 | 1 | Application |
| Alibaba clone script project | 1 | 1 | Application |
| Amino | 6 | 30 | Operating System |
| Simple student information system project | 1 | 12 | Application |
| Sonicspot | 1 | 1 | Application |
| Cnedra | 1 | 1 | Application |
| Daily prayer time project | 1 | 4 | Application |
| Wayland | 1 | 1 | Application |
| Halo | 1 | 33 | Application |
| Gxgroup | 1 | 1 | Operating System |
| Francisco burzi | 3 | 99 | Application |
| Obridge project | 1 | 1 | Application |
| Nuovo | 1 | 1 | Application |
| Noc2 | 1 | 1 | Application |
| Jw calendar | 1 | 1 | Application |