Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Coreboot | 1 | 1 | Operating System |
| Rocomotion | 10 | 11 | Application |
| Nostatic | 1 | 1 | Application |
| Xovis | 3 | 9 | Hardware |
| Includesecurity | 1 | 1 | Application |
| Pedro villavicencio garrido | 1 | 1 | Application |
| Tripplite | 2 | 2 | Hardware |
| Gantt chart project | 1 | 2 | Application |
| Trane | 10 | 11 | Hardware |
| Adam tomecek | 1 | 1 | Application |
| Nintex | 4 | 4 | Application |
| Xiao5ucompany project | 1 | 2 | Application |
| Betsy | 1 | 1 | Application |
| Huntercoin | 1 | 1 | Application |
| Openbook book data project | 1 | 1 | Application |
| Jjson project | 1 | 1 | Application |
| Node template project | 1 | 1 | Application |
| 2345 security guard project | 1 | 25 | Application |
| Heartex | 1 | 1 | Application |
| Pdshoppro | 1 | 1 | Application |