Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Snom | 6 | 7 | Operating System |
| Zhangyanbo2007 | 1 | 5 | Application |
| Chaijis | 1 | 1 | Application |
| Antonkueltz | 1 | 2 | Application |
| Chainsafe | 3 | 6 | Application |
| Akbim | 1 | 2 | Application |
| Opticam | 1 | 20 | Hardware |
| Meshtastic | 1 | 3 | Application |
| Kyle browning | 1 | 2 | Application |
| Unlcms | 1 | 2 | Application |
| Tbdev net | 1 | 2 | Application |
| Mobile industrial robots | 5 | 25 | Operating System |
| Vocera communications | 1 | 1 | Application |
| Simple download monitor project | 1 | 2 | Application |
| School administration project | 1 | 1 | Application |
| Mapbender | 1 | 2 | Application |
| Luxbum | 1 | 1 | Application |
| Airmore | 1 | 1 | Application |
| Kevinhankens | 1 | 1 | Application |
| Feedgen project | 1 | 1 | Application |