Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Tekon | 8 | 8 | Operating System |
| Tsutaya | 1 | 1 | Application |
| Viadat | 1 | 1 | Application |
| Aj square inc | 1 | 1 | Application |
| Bowo | 3 | 20 | Application |
| Gianni tedesco | 1 | 1 | Application |
| Sendio | 1 | 3 | Application |
| Cometd | 1 | 1 | Application |
| Branaghgroup | 1 | 1 | Application |
| Netapp | 121 | 2839 | Operating System |
| Go oo | 1 | 1 | Application |
| Grade point average gpa calculator project | 1 | 4 | Application |
| Dale mooney | 3 | 3 | Application |
| Http proxy agent project | 1 | 1 | Application |
| Peachpay | 1 | 1 | Application |
| Facebook wall and social integration project | 1 | 1 | Application |
| Magic | 2 | 2 | Application |
| Myagileprivacy | 1 | 1 | Application |
| Clicknet | 1 | 1 | Application |
| Teradek | 9 | 9 | Operating System |