Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Http file server project | 1 | 1 | Application |
| Gxgroup | 1 | 1 | Hardware |
| Wacom | 3 | 9 | Application |
| Source workshop | 4 | 4 | Application |
| Horizondatasys | 1 | 1 | Application |
| Extremenetworks | 7 | 23 | Operating System |
| Woocommerce custom checkout fields editor with drag drop project | 1 | 1 | Application |
| Crafthemes | 1 | 2 | Application |
| The web drivers | 1 | 1 | Application |
| Fossies | 2 | 2 | Application |
| Shopsite | 1 | 3 | Application |
| Groovemusic project | 1 | 1 | Application |
| Michelle cox | 1 | 2 | Application |
| Libmirage project | 1 | 1 | Application |
| Capsule8 | 1 | 1 | Application |
| Comix | 1 | 2 | Application |
| Invoiceplane | 1 | 15 | Application |
| Ecowitt | 1 | 1 | Hardware |
| Scalapay | 1 | 1 | Application |
| Osstech | 1 | 5 | Application |