Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Pear programming project | 1 | 1 | Application |
| Opmantek | 2 | 24 | Application |
| Rcu cell project | 1 | 1 | Application |
| Syska | 2 | 2 | Hardware |
| Dahua | 1 | 2 | Hardware |
| Bandisoft | 4 | 11 | Application |
| Hz soft | 1 | 1 | Application |
| Phpcards | 1 | 2 | Application |
| Dupehunter | 1 | 1 | Application |
| Newsletter popup project | 1 | 6 | Application |
| Nats | 4 | 11 | Application |
| Serverwg project | 1 | 1 | Application |
| Insiders technologies | 1 | 1 | Application |
| Bruce corkhill | 1 | 1 | Application |
| Charles clark | 1 | 1 | Application |
| Gamespy3d | 1 | 1 | Application |
| Buttonizer | 2 | 4 | Application |
| Mpg321 project | 1 | 1 | Application |
| Linux nis | 2 | 3 | Application |
| Gurgens | 2 | 2 | Application |