The Risky Tech Ranking (RTR) is derived using a three step process:
This page provides information on how each step is carried out.
We primarily score vendors that appear in NIST's Official CPE Dictionary. In order to maintain fidelity with the National Vulnerability Database, we score some additional vendors. We do not replace names appearing in the CPE dictionary with the name of the legal entity that “owns” the vendor. This means the following:
Collect all vulnerabilities in the National Institute of Standards and Technologies (NIST) National Vulnerability Database (NVD) and all vendors in NIST’s Common Platform Enumeration (CPE) dictionary.
NIST offers a channel (cpe_dictionary@nist.gov) whereby vendors can request changes to the CPE dictionary. After all calculations are complete, we map CPE strings to names that are better formatted for presentation on the website.
We source vulnerabilities in NIST’s National Vulnerability Database for various reasons:
These factors are not true of proprietary vulnerability databases.
The NVD contains partial mapping of CVE IDs to CPE vendors, which is known as enrichment and maintained by NIST. However, this is incomplete, in part due to the enrichment crisis that started in February 2024.
To map CVE IDs to vendors, we use the following hierarchy:
Our final step is to assign a Vendor Score to vendors that takes into account all the vulnerabilities that we identified in Step 2.
To account for risk, each vulnerability is weighted by its Coalition Exploit Scoring System (Coalition ESS) score, which is based on the probability of exploitation. This means high-risk vulnerabilities contribute more to the aggregate score than low-risk vulnerabilities.
To calculate Vendor Score, we sum the Coalition ESS scores of all vulnerabilities affecting that vendor in a time period. The formula is mathematically equivalent to:
Vendor Score = (Number of Vulnerabilities) x (Average Coalition ESS Score)
The vendor score aggregates the Coalition ESS score of vulnerabilities impacting all products associated with a particular vendor. This formula has a number of implications:
Coalition ESS scores in the Risky Tech Ranking are based on data pulled from NIST's NVD on April 1, 2025. In order to reproduce our ranking, we recommend using the following resources:
Please note, this file contains one row per vulnerability record from the NVD. It contains the following columns:
The Risky Tech Ranking is based on publicly available data and is intended for general, informational purposes only, and not as legal, professional, or consulting advice; use of the Risky Tech Ranking is solely at your own risk. The Risky Tech Ranking is a list of unaffiliated third-party technology providers ranked by a methodology based on Coalition’s Exploit Scoring System (Coalition ESS), which is powered by generative AI, machine learning, and an underlying algorithm that provides assessment of all publicly disclosed vulnerabilities and evaluates a technology vendor's risk based on the exploitability of reported vulnerabilities over a set time period. Coalition disclaims all warranties, express or implied. Risky Tech Ranking results may vary or fluctuate based on factors outside of Coalition's control.
Coalition’s and for additional information.