Technology Vendor Vulnerability Posture

This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.
Vendor Name Number of Product Vulnerabilities Type
Built2go 4 4 Application
Tug 4 23 Application
Bluboo d3 pro project 1 1 Hardware
Beaconmedaes 1 3 Hardware
Arcowave systems 1 1 Hardware
Ps kill project 1 1 Application
Alibaba clone script project 1 1 Application
Amino 6 30 Operating System
Simple student information system project 1 12 Application
Sonicspot 1 1 Application
Cnedra 1 1 Application
Daily prayer time project 1 4 Application
Wayland 1 1 Application
Halo 1 33 Application
Gxgroup 1 1 Operating System
Francisco burzi 3 99 Application
Obridge project 1 1 Application
Nuovo 1 1 Application
Noc2 1 1 Application
Jw calendar 1 1 Application
Showing 20 of 38279 Results