Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Netsmart | 1 | 1 | Application |
| Element it | 2 | 6 | Application |
| Wi2be | 1 | 3 | Application |
| Cybozu | 21 | 366 | Application |
| Daggerheart | 1 | 2 | Application |
| Rocky nu | 2 | 2 | Application |
| Lhaplus project | 1 | 9 | Application |
| A a s application access server | 1 | 1 | Application |
| Baofeng | 1 | 5 | Application |
| Teether | 1 | 1 | Application |
| Muhammarajs project | 1 | 1 | Application |
| Kimihia | 1 | 1 | Application |
| Galliumos | 1 | 1 | Operating System |
| Ardour | 1 | 2 | Application |
| Teamviewer | 3 | 18 | Application |
| The electric billing management system project | 1 | 1 | Application |
| Pkware | 1 | 2 | Application |
| Vandyke | 3 | 4 | Application |
| Melvin mach | 1 | 1 | Application |
| Qasymphony | 1 | 1 | Application |