Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Syntax cms project | 1 | 1 | Application |
| Delegate | 1 | 10 | Application |
| Lapce | 1 | 1 | Application |
| Mxsdoc project | 1 | 1 | Application |
| King products | 1 | 1 | Application |
| Trailing slash project | 1 | 1 | Application |
| Juergen | 1 | 1 | Application |
| Apk parser2 project | 1 | 1 | Application |
| Ion parser project | 1 | 1 | Application |
| Line | 3 | 3 | Application |
| Streama project | 1 | 1 | Application |
| Muskatli | 1 | 1 | Application |
| Pgina | 1 | 1 | Application |
| Qsix | 1 | 1 | Application |
| Fore | 1 | 1 | Application |
| Voxpupuli | 1 | 1 | Application |
| Rangy project | 1 | 1 | Application |
| Quasar form | 1 | 1 | Application |
| Teacher record management system project | 1 | 1 | Application |
| Healthways | 1 | 1 | Application |