Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Five9 | 1 | 2 | Application |
| Erikogluteknoloji | 1 | 1 | Application |
| Atomicwebstrategy | 1 | 1 | Application |
| St | 87 | 96 | Operating System |
| Web labs | 1 | 1 | Application |
| Mapping multiple urls redirect same page project | 1 | 1 | Application |
| Vizayn urun | 1 | 1 | Application |
| Vchs | 1 | 1 | Application |
| Tachyon | 2 | 5 | Application |
| Perl | 11 | 70 | Application |
| Ss downloads project | 1 | 1 | Application |
| Etm s | 1 | 1 | Application |
| Ychat | 1 | 1 | Application |
| Xomol | 1 | 3 | Application |
| Sized chunks project | 1 | 6 | Application |
| Social microblogging pro project | 1 | 1 | Application |
| Digital mappings systems | 1 | 1 | Application |
| Easy trading token project | 1 | 1 | Application |
| Kingston | 3 | 9 | Hardware |
| Agilent technologies | 1 | 1 | Application |