Technology Vendor Vulnerability Posture

This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.
Vendor Name Number of Product Vulnerabilities Type
Gogogate 1 11 Hardware
Bluesky 1 1 Application
Centralite 1 1 Hardware
Nik software inc 1 1 Application
Expeditersonline 1 1 Application
Prophecyinternational 2 4 Application
Floriansimunek 1 2 Application
Wpn xm 1 2 Application
Ketchup restaurant reservations project 1 2 Application
Flient 1 2 Hardware
Deepsoft 1 5 Application
Gncchome 1 3 Hardware
Qsmart next project 1 1 Application
Aten 3 16 Operating System
Liviu mitrofan 1 1 Application
Advanced forms project 1 1 Application
Email subscriber project 1 1 Application
Steedos 1 1 Application
Node notifier project 1 1 Application
Guardzilla 8 10 Hardware
Showing 20 of 37664 Results