Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Online student enrollment system project | 1 | 4 | Application |
| Iktm | 1 | 2 | Application |
| Parakey inc | 1 | 2 | Application |
| Brooks internet software | 2 | 2 | Application |
| Bund | 2 | 3 | Application |
| Hamilton medical | 1 | 3 | Hardware |
| Notredame | 1 | 1 | Application |
| Tcl | 10 | 59 | Hardware |
| Corporater | 1 | 2 | Application |
| Imagemenu project | 1 | 1 | Application |
| Alqa6ari | 1 | 1 | Application |
| Opendock | 3 | 3 | Application |
| Hoermann | 3 | 3 | Hardware |
| Jiucaitoken project | 1 | 1 | Application |
| Clusterresources | 1 | 3 | Application |
| Wpbeaveraddons | 1 | 21 | Application |
| Fla shop | 2 | 5 | Application |
| Kaoshifeng | 1 | 4 | Application |
| Ureport2 project | 1 | 2 | Application |
| Kramerav | 1 | 3 | Application |