Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Ziproxy | 1 | 1 | Application |
Radiance | 1 | 1 | Application |
Yast | 2 | 2 | Application |
Shrubbery | 1 | 1 | Application |
Zak b elep | 1 | 1 | Application |
Remi vanicat | 1 | 1 | Application |
3com | 32 | 38 | Hardware |
John horne | 1 | 1 | Application |
Celerondude | 1 | 1 | Application |
Openedit inc | 1 | 1 | Application |
Scilab | 2 | 2 | Application |
Wpdevart | 17 | 44 | Application |
Alcovebook | 1 | 1 | Application |
Articlecms project | 1 | 4 | Application |
Eric raymond | 1 | 1 | Application |
Cadsoft | 1 | 1 | Application |
Plexcor | 1 | 1 | Application |
Mihai bazon | 1 | 1 | Application |
Polopoly | 1 | 1 | Application |
Georges khaznadar | 1 | 1 | Application |