Technology Vendor Vulnerability Posture
Vendor Directory
This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Jfusion | 1 | 1 | Application |
| Shenzhen dragon brothers | 1 | 1 | Operating System |
| Multixtpm | 1 | 1 | Application |
| Rivetcode | 1 | 3 | Application |
| Severalnines | 1 | 1 | Application |
| Exasol | 1 | 1 | Application |
| Man machine systems | 1 | 1 | Application |
| Novell | 27 | 477 | Operating System |
| Trustedconnectivityalliance | 1 | 1 | Application |
| Setelsa security | 1 | 3 | Application |
| Everywhere | 1 | 1 | Application |
| Gutengeek | 2 | 2 | Application |
| Polarlearn | 1 | 4 | Application |
| Advancedformintegration | 1 | 9 | Application |
| Webmethods | 1 | 1 | Application |
| Vistabb | 1 | 1 | Application |
| Micahblu | 1 | 3 | Application |
| Repo git downloader project | 1 | 1 | Application |
| Continuous software | 1 | 1 | Application |
| Resend welcome email project | 1 | 1 | Application |