Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Oxidized web project | 1 | 2 | Application |
Coreboot | 1 | 1 | Operating System |
Rocomotion | 10 | 11 | Application |
Nostatic | 1 | 1 | Application |
Xovis | 3 | 9 | Hardware |
Includesecurity | 1 | 1 | Application |
Pedro villavicencio garrido | 1 | 1 | Application |
Gantt chart project | 1 | 2 | Application |
Tripplite | 2 | 2 | Hardware |
Trane | 10 | 11 | Hardware |
Adam tomecek | 1 | 1 | Application |
Nintex | 4 | 4 | Application |
Xiao5ucompany project | 1 | 2 | Application |
Betsy | 1 | 1 | Application |
Huntercoin | 1 | 1 | Application |
Openbook book data project | 1 | 1 | Application |
Node template project | 1 | 1 | Application |
Jjson project | 1 | 1 | Application |
2345 security guard project | 1 | 25 | Application |
Heartex | 1 | 1 | Application |