Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Elding project | 1 | 1 | Application |
| Ericsson | 4 | 9 | Hardware |
| W4 post list project | 1 | 4 | Application |
| Musicpd | 1 | 1 | Application |
| Progess | 1 | 2 | Application |
| Publisure | 1 | 3 | Application |
| Ohesa emlak portali | 1 | 1 | Application |
| Harpia | 1 | 1 | Application |
| Globalmiles | 1 | 1 | Application |
| Campusvirtualcomputrade | 1 | 3 | Application |
| 1xinternet | 1 | 2 | Application |
| Shadow maint | 1 | 2 | Application |
| Systransoft | 1 | 2 | Application |
| Autorespond | 1 | 1 | Application |
| Zipato | 1 | 3 | Operating System |
| Pysha3 project | 1 | 1 | Application |
| Tonton tei waiting project | 1 | 1 | Application |
| Fon | 5 | 5 | Hardware |
| Ben spink | 1 | 1 | Application |
| Byfes | 1 | 1 | Application |