Technology Vendor Vulnerability Posture

This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.
Vendor Name Number of Product Vulnerabilities Type
Pcf2bdf project 1 2 Application
Chicken of the vnc 1 1 Application
Wedding hall booking system project 1 4 Application
Libexe project 1 1 Application
Norman 7 28 Application
Fantastic guestbook project 1 1 Application
John g myers 1 2 Application
Eihitech 1 1 Application
Kmc information systems 1 1 Application
Armorlogic 1 5 Application
Slims akasia project 1 5 Application
Newphoria corporation 6 8 Application
Burnstone 1 1 Application
21 6 productions 1 1 Application
Creloaded 1 3 Application
Icecms project 1 2 Application
Civica software 1 1 Application
Surveyking project 1 1 Application
Simple online piggery management system project 1 3 Application
Bkw 1 2 Operating System
Showing 20 of 37506 Results