Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Jellytap | 1 | 1 | Application |
| Rpm | 6 | 26 | Application |
| Devscripts | 1 | 1 | Application |
| Airlive | 5 | 8 | Hardware |
| Hdfgroup | 1 | 128 | Application |
| Paul smith computer services | 1 | 3 | Application |
| Nordex | 1 | 2 | Operating System |
| Servision | 1 | 3 | Operating System |
| Atarim | 3 | 15 | Application |
| Webliberty | 1 | 3 | Application |
| Dieboldnixdorf | 4 | 11 | Application |
| Xylogics | 1 | 1 | Application |
| H h | 1 | 1 | Application |
| Gravitl | 1 | 6 | Application |
| Nbcfc | 1 | 1 | Application |
| Openiam | 1 | 5 | Application |
| Solspace | 1 | 1 | Application |
| Swetrix | 1 | 1 | Application |
| Devsaran | 11 | 11 | Application |
| Trello octometric project | 1 | 1 | Application |