Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Jiran | 2 | 2 | Application |
| Controlbyweb | 6 | 7 | Hardware |
| Genesys | 6 | 7 | Application |
| Afterlogic | 8 | 17 | Application |
| Design nation | 1 | 1 | Application |
| Plptools | 1 | 1 | Application |
| Idm computer solutions inc | 1 | 1 | Application |
| Entitybulkdelete project | 1 | 1 | Application |
| Yoga class registration system project | 1 | 12 | Application |
| Phpwordpress | 1 | 1 | Application |
| Western | 1 | 1 | Application |
| Tac | 1 | 1 | Application |
| Brew city software | 1 | 1 | Application |
| Gambas project | 1 | 1 | Application |
| Junkbuster | 1 | 2 | Application |
| Comba | 2 | 2 | Hardware |
| Vivo | 2 | 4 | Hardware |
| Tdc | 1 | 1 | Application |
| Sagem | 1 | 1 | Operating System |
| Goolytics project | 1 | 1 | Application |