Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Jupyterhub | 4 | 4 | Application |
| Ovation | 3 | 3 | Application |
| Rocket chat | 2 | 53 | Application |
| Aspcms | 1 | 1 | Application |
| Sap | 416 | 1968 | Application |
| Umbraco | 6 | 65 | Application |
| Idera | 2 | 9 | Application |
| Minicom project | 1 | 1 | Application |
| Jquery update project | 1 | 1 | Application |
| Haxx | 2 | 236 | Application |
| Lansweeper | 1 | 18 | Application |
| Labjs project | 1 | 1 | Application |
| Wuzhi cms project | 1 | 8 | Application |
| Crocoblock | 14 | 64 | Application |
| Ibm | 977 | 11051 | Application |
| Icmsdev | 1 | 18 | Application |
| Puppet | 28 | 203 | Application |
| 1234n | 1 | 31 | Application |
| Qnap | 48 | 263 | Application |
| Discourse | 20 | 195 | Application |