Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Etan | 1 | 1 | Application |
| Karacsi maci | 1 | 1 | Application |
| Fusiondirectory | 1 | 3 | Application |
| Aternity | 1 | 3 | Application |
| Choosemuse | 1 | 1 | Operating System |
| Flicks software | 1 | 3 | Application |
| Ltb project | 2 | 2 | Application |
| Smartwp | 1 | 3 | Application |
| Szuray | 93 | 558 | Hardware |
| 1000cms | 1 | 8 | Application |
| Funkwerk | 1 | 2 | Hardware |
| Shogyo | 1 | 1 | Application |
| Cerner | 1 | 2 | Hardware |
| Dominios europa | 1 | 2 | Application |
| Grandstream | 52 | 144 | Operating System |
| Tigera | 1 | 2 | Operating System |
| Janboddez | 1 | 2 | Application |
| Private cloud management platform project | 1 | 1 | Application |
| Gupta technologies | 1 | 1 | Application |
| Mydyngallery | 1 | 1 | Application |