Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Apertium | 1 | 1 | Application |
| Tombstone | 1 | 1 | Application |
| Aptoncd | 1 | 1 | Application |
| Acccheck project | 1 | 1 | Application |
| Yaws | 2 | 11 | Application |
| Arb project | 1 | 1 | Application |
| Ximdex | 1 | 4 | Application |
| Audiolink | 1 | 1 | Application |
| Adium | 1 | 6 | Application |
| Iglues | 1 | 1 | Application |
| Information call center | 1 | 1 | Application |
| Gleydson mazioli da silva | 1 | 1 | Application |
| Ultraapps | 1 | 1 | Application |
| Tivano | 1 | 1 | Application |
| Livejournal | 1 | 3 | Application |
| Convirture | 1 | 1 | Application |
| Guus sliepen | 1 | 1 | Application |
| Nostatic | 1 | 1 | Application |
| Yii2 statemachine | 1 | 1 | Application |
| Metadot | 1 | 1 | Application |