Technology Vendor Vulnerability Posture

This page offers a directory of technology vendors, allowing you to explore various product vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for understanding the security posture of different technology providers, helping users make informed decisions regarding their tech investments and cybersecurity strategies.
Vendor Name Number of Product Vulnerabilities Type
E blah 1 1 Application
Hal networks 3 3 Application
Devise token auth project 1 1 Application
Danskebank 1 1 Application
Avg 12 46 Application
Psiturk 1 1 Application
Octokit 3 4 Application
Horus cms project 1 1 Application
Cookies consent manager project 1 3 Application
Articlecms project 1 4 Application
10 10 Hardware
Elra 1 1 Application
Mifos 1 1 Application
Codesupply 3 4 Application
Aajoda 1 2 Application
M5t 1 1 Operating System
Nonghyup 4 4 Application
Online food ordering system v2 project 1 3 Application
Gnqs 1 1 Application
Backdropcms 4 30 Application
Showing 20 of 38311 Results