Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Wecon | 2 | 3 | Application |
| Braekling | 1 | 1 | Application |
| Steve kneizys | 1 | 2 | Application |
| Nedi | 1 | 26 | Application |
| Gitjacker project | 1 | 1 | Application |
| Kyland | 1 | 2 | Hardware |
| Accordion shortcodes project | 1 | 1 | Application |
| Huruhelpdesk | 1 | 1 | Application |
| A2hosting | 1 | 1 | Application |
| Dev l s | 2 | 2 | Application |
| Alpha centauri software | 1 | 1 | Application |
| Innomedia | 1 | 1 | Hardware |
| It747 | 1 | 2 | Application |
| Tricentis | 1 | 1 | Application |
| Dancer | 1 | 1 | Application |
| Enphase | 2 | 18 | Operating System |
| Open newsletter | 1 | 3 | Application |
| Microsoft | 146 | 87274 | Operating System |
| Ifoto | 1 | 2 | Application |
| Visibility software | 1 | 2 | Application |