Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Entrust | 5 | 65 | Operating System |
| Liquidpixels | 1 | 1 | Operating System |
| Slicewp | 1 | 3 | Application |
| Gator | 1 | 1 | Application |
| Ultra prod | 1 | 1 | Application |
| Hangzhou network technology development | 1 | 1 | Application |
| Neurobin | 1 | 3 | Application |
| Spiremedia | 1 | 1 | Application |
| Compassplustechnologies | 1 | 1 | Application |
| Zendocs | 1 | 1 | Application |
| Exiftool project | 1 | 3 | Application |
| Urtracker | 1 | 1 | Application |
| Garfield petshop project | 1 | 1 | Application |
| Jwcrypto project | 1 | 1 | Application |
| Shahrood | 1 | 1 | Application |
| Francisco charrua | 1 | 1 | Application |
| Simple php agenda | 1 | 2 | Application |
| Protonvpn | 1 | 1 | Application |
| Xinkaa web station | 1 | 1 | Application |
| Adastra | 1 | 1 | Application |