Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Ziproxy | 1 | 1 | Application |
| Radiance | 1 | 1 | Application |
| Yast | 2 | 2 | Application |
| Shrubbery | 1 | 1 | Application |
| Zak b elep | 1 | 1 | Application |
| Remi vanicat | 1 | 1 | Application |
| 3com | 32 | 38 | Hardware |
| John horne | 1 | 1 | Application |
| Celerondude | 1 | 1 | Application |
| Openedit inc | 1 | 1 | Application |
| Scilab | 2 | 2 | Application |
| Wpdevart | 17 | 47 | Application |
| Alcovebook | 1 | 1 | Application |
| Articlecms project | 1 | 4 | Application |
| Eric raymond | 1 | 1 | Application |
| Cadsoft | 1 | 1 | Application |
| Plexcor | 1 | 1 | Application |
| Mihai bazon | 1 | 1 | Application |
| Polopoly | 1 | 1 | Application |
| Georges khaznadar | 1 | 1 | Application |