Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Itan online banking security system | 1 | 1 | Application | 
| 8x8 | 1 | 5 | Application | 
| Qwizcards project | 1 | 1 | Application | 
| Slicedinvoices | 1 | 3 | Application | 
| Estoreaff | 1 | 1 | Application | 
| Heiko stamer | 2 | 2 | Application | 
| Loco translate project | 1 | 3 | Application | 
| Libgsf | 1 | 1 | Application | 
| Wp attachment export project | 1 | 1 | Application | 
| Wasdk project | 1 | 1 | Application | 
| Mms gallery | 1 | 1 | Application | 
| Yworks | 1 | 2 | Application | 
| Libtorrent | 1 | 2 | Application | 
| Protected pages project | 1 | 1 | Application | 
| Typesettercms | 1 | 11 | Application | 
| Clever cloud | 1 | 1 | Application | 
| Neuvoo | 1 | 2 | Application | 
| Studiewijzer | 1 | 1 | Application | 
| Hutchhouse | 1 | 1 | Application | 
| Perlpodder | 1 | 2 | Application |