Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Elite bulletin board | 1 | 2 | Application |
| Redi | 1 | 1 | Application |
| Adive | 1 | 5 | Application |
| Bintec | 3 | 3 | Hardware |
| Imdb clone project | 1 | 1 | Application |
| Veronalabs | 2 | 37 | Application |
| Hcltech | 1 | 1 | Operating System |
| Finecms project | 1 | 26 | Application |
| Sagedpw | 1 | 7 | Application |
| Telenavsoftware | 1 | 1 | Application |
| Pear programming project | 1 | 1 | Application |
| Rcu cell project | 1 | 1 | Application |
| Opmantek | 2 | 24 | Application |
| Syska | 2 | 2 | Hardware |
| Dahua | 1 | 2 | Hardware |
| Bandisoft | 4 | 11 | Application |
| Hz soft | 1 | 1 | Application |
| Phpcards | 1 | 2 | Application |
| Dupehunter | 1 | 1 | Application |
| Newsletter popup project | 1 | 6 | Application |