Technology Vendor Vulnerability Posture

This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.

Vendor Name Number of Product Vulnerabilities Type
Unicon software 2 2 Application
Bkleineidam 1 1 Application
Jelsoft 5 60 Application
Javier fernandez 1 1 Application
Corel 24 59 Application
Dann frazier 2 2 Application
Mohammed sameer 1 1 Application
Bubblesoftapps 1 1 Application
Federico di gregorio 1 1 Application
Ranksol 3 3 Application
Healthnode hospital management system project 1 1 Application
Erl wustl 1 1 Application
Arenam 1 1 Application
Infodoc 1 2 Application
Holloway 1 1 Application
Efilego 1 2 Application
Jimtawl project 1 1 Application
Geda 1 1 Application
Ptnet 1 1 Application
Aucko 1 1 Application
Showing 20 of 39200 Results