Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Xrms crm | 1 | 1 | Application |
| Matthew smith | 1 | 2 | Application |
| Cauldron | 2 | 2 | Application |
| Buffercode | 2 | 9 | Application |
| Plex | 2 | 18 | Application |
| Walk score project | 1 | 1 | Application |
| Kea hotel erp project | 1 | 1 | Application |
| Hikvision | 421 | 532 | Operating System |
| Y blog | 1 | 2 | Application |
| Sm3ny | 1 | 1 | Application |
| Dojotoolkit | 1 | 11 | Application |
| Gavazzionline | 1 | 1 | Application |
| Merlix | 2 | 4 | Application |
| Codeblue | 1 | 1 | Application |
| Jonijnm | 1 | 1 | Application |
| Xigla | 16 | 37 | Application |
| Horms | 1 | 1 | Application |
| Astrolog | 1 | 1 | Application |
| Aatifaneeq | 1 | 11 | Application |
| Pyinstaller | 1 | 3 | Application |