Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Gdatasoftware | 1 | 1 | Application |
| Telartis bv | 1 | 2 | Application |
| Nchsoftware | 8 | 34 | Application |
| Hans oesterholt | 1 | 6 | Application |
| Hedgedoc | 1 | 12 | Application |
| Mod auth mellon project | 1 | 3 | Application |
| Mahara | 2 | 110 | Application |
| Tiger | 1 | 1 | Application |
| Nopcommerce | 2 | 16 | Application |
| Ampache | 1 | 25 | Application |
| Opmantek | 2 | 24 | Application |
| R foundation | 1 | 1 | Application |
| Trixbox | 2 | 3 | Application |
| Deep set project | 1 | 1 | Application |
| Dset project | 1 | 3 | Application |
| Proxim | 7 | 8 | Hardware |
| Shvl project | 1 | 1 | Application |
| Yerba | 1 | 3 | Application |
| Flattenizer project | 1 | 1 | Application |
| Wikindx project | 1 | 4 | Application |