Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Haxeshim project | 1 | 1 | Application |
| Bp blog | 1 | 1 | Application |
| Tribulant | 5 | 40 | Application |
| 9seeds | 1 | 1 | Application |
| Admincolumns | 1 | 3 | Application |
| Supcontech | 1 | 1 | Operating System |
| Schneider electric | 1 | 2 | Operating System |
| Giftup | 1 | 2 | Application |
| Lmsdoctor | 1 | 2 | Application |
| Json pattern validator project | 1 | 2 | Application |
| Dalbum | 1 | 1 | Application |
| Blackmoonftpserver | 1 | 1 | Application |
| Ctekproducts | 2 | 2 | Operating System |
| Netasq project | 1 | 1 | Application |
| Cybird | 2 | 2 | Application |
| Wpxpro | 1 | 15 | Application |
| Ajayrandhawa | 1 | 2 | Application |
| Zen project | 1 | 1 | Application |
| Hyumika | 1 | 6 | Application |
| Foxmail | 2 | 5 | Application |