Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Calendarscript | 1 | 4 | Application |
| Conquest | 1 | 1 | Application |
| Laracms project | 1 | 3 | Application |
| Nune | 1 | 1 | Application |
| Opening hours project | 1 | 1 | Application |
| Proxychains ng project | 1 | 1 | Application |
| Create sd | 1 | 1 | Application |
| Peter d gray | 1 | 1 | Application |
| Jfusion | 1 | 1 | Application |
| Shenzhen dragon brothers | 1 | 1 | Operating System |
| Multixtpm | 1 | 1 | Application |
| Rivetcode | 1 | 3 | Application |
| Severalnines | 1 | 1 | Application |
| Exasol | 1 | 1 | Application |
| Man machine systems | 1 | 1 | Application |
| Novell | 27 | 477 | Operating System |
| Setelsa security | 1 | 3 | Application |
| Everywhere | 1 | 1 | Application |
| Gutengeek | 2 | 2 | Application |
| Advancedformintegration | 1 | 9 | Application |