Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Hiniarata | 1 | 6 | Application |
| Ceruleanstudios | 2 | 9 | Application |
| Sisoftware | 2 | 2 | Application |
| Mojohaus | 1 | 1 | Application |
| Javik | 1 | 1 | Application |
| Iprimal | 1 | 2 | Application |
| Lazyer | 1 | 1 | Application |
| Keep it simple guest book | 1 | 2 | Application |
| Messaging web application project | 1 | 1 | Application |
| Progress | 39 | 245 | Application |
| Mesalabs | 1 | 5 | Application |
| Monotone | 1 | 2 | Application |
| Qd metro | 1 | 1 | Application |
| Morehubbub | 1 | 1 | Application |
| Accoria | 1 | 5 | Application |
| Socialsitegenerator | 1 | 3 | Application |
| Automationdirect | 75 | 315 | Hardware |
| Open emr | 1 | 147 | Application |
| Bearidlock | 1 | 1 | Application |
| Hot files | 1 | 1 | Application |