Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Wp reroute email project | 1 | 3 | Application |
Huawei | 1008 | 4835 | Hardware |
Treble designs | 1 | 2 | Application |
Amazon clone project | 1 | 1 | Application |
Torrenttrader project | 1 | 1 | Application |
Xiongmaitech | 227 | 241 | Operating System |
Ocean12tech | 3 | 6 | Application |
Virtual hosting control system | 1 | 8 | Application |
Flagsmith | 1 | 2 | Application |
Hbm | 1 | 1 | Application |
Noticeware | 2 | 3 | Application |
Eshop project | 1 | 3 | Application |
Altersoftware | 1 | 1 | Application |
Fishaudio | 1 | 1 | Application |
Gzstoken project | 1 | 1 | Application |
Tiva events calendar project | 1 | 1 | Application |
Wouter verhelst | 1 | 6 | Application |
Ozeki | 2 | 12 | Application |
Peppermint | 1 | 4 | Application |
Gibbonedu | 1 | 16 | Application |