Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Presslayouts | 1 | 1 | Application |
| Ethereumblack project | 1 | 2 | Application |
| Swapnilpatil | 1 | 1 | Application |
| Citrix | 27 | 235 | Operating System |
| Intensive point | 1 | 2 | Application |
| Dynamic universal music bibliotheque | 1 | 1 | Application |
| Late static project | 1 | 1 | Application |
| Edreamers | 2 | 3 | Application |
| R3 | 1 | 1 | Application |
| Endian firewall | 1 | 1 | Application |
| Jalinfotec | 1 | 1 | Application |
| Phpoffice project | 1 | 1 | Application |
| Particle soft | 4 | 10 | Application |
| Viatech | 1 | 1 | Hardware |
| Flusity | 1 | 28 | Application |
| Afthemes | 1 | 5 | Application |
| Augustine project | 1 | 1 | Application |
| Montonio | 1 | 1 | Application |
| Icodollar project | 1 | 1 | Application |
| Myscript | 1 | 1 | Application |