Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Lemurmonitors | 1 | 1 | Application |
| Roku | 2 | 4 | Operating System |
| Krusader | 1 | 2 | Application |
| Remi lefebvre | 1 | 1 | Application |
| Divebook project | 1 | 3 | Application |
| Koushik dutta | 1 | 4 | Application |
| Thecreativeheads de | 1 | 1 | Application |
| Phpfox | 1 | 11 | Application |
| David strauss | 1 | 1 | Application |
| Netiq | 16 | 92 | Application |
| Tridia | 2 | 2 | Application |
| Omniosce | 1 | 4 | Operating System |
| Taisan | 1 | 2 | Application |
| Yydevelopment | 1 | 1 | Application |
| Abtei neuburg | 1 | 1 | Application |
| Xfs | 1 | 1 | Application |
| Mercusys | 3 | 7 | Hardware |
| Moxa | 31 | 84 | Application |
| Barraguard | 1 | 1 | Hardware |
| Properties reader project | 1 | 1 | Application |