Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
| Vendor Name | Number of Product | Vulnerabilities | Type |
|---|---|---|---|
| Je form creator | 1 | 1 | Application |
| Online pizza ordering project | 1 | 1 | Application |
| Cervantessec | 1 | 2 | Application |
| Nooz project | 1 | 1 | Application |
| Goutil project | 1 | 1 | Application |
| Smoelenboek project | 1 | 1 | Application |
| Alan cox | 1 | 1 | Application |
| Chatbot application with a suggestion feature project | 1 | 1 | Application |
| Serve here js project | 1 | 1 | Application |
| Webproxy project | 1 | 3 | Application |
| Barassistant | 1 | 1 | Application |
| Subzane | 1 | 1 | Application |
| Jbb | 1 | 1 | Application |
| Passwordprotectwp | 1 | 4 | Application |
| Bgsvetionik | 1 | 1 | Application |
| Web crossing inc | 1 | 2 | Application |
| Foresight linux | 1 | 1 | Operating System |
| Storefront for gallery | 1 | 1 | Application |
| Nextscripts | 1 | 10 | Application |
| Cfagcms | 1 | 2 | Application |