Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Richrumble | 1 | 2 | Application |
Lblog | 1 | 2 | Application |
Aksoft | 1 | 1 | Application |
Sungrowpower | 1 | 7 | Operating System |
Techroutes | 1 | 1 | Hardware |
R company | 1 | 1 | Application |
Erl wustl | 1 | 1 | Application |
Mindstorm | 1 | 1 | Application |
Opensid | 1 | 3 | Application |
Activefusions | 1 | 1 | Application |
Seur oficial project | 1 | 3 | Application |
Orangehrm | 1 | 21 | Application |
Saphali | 1 | 1 | Application |
Telemessage | 1 | 2 | Application |
Ncaster | 1 | 1 | Application |
Thinc4orce marketing group | 1 | 1 | Application |
Arcworks | 1 | 1 | Application |
Eleopard | 1 | 3 | Application |
Tickera | 2 | 11 | Application |
Healthylifestyle project | 1 | 1 | Application |