Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Korenix | 88 | 206 | Hardware | 
| Sharpcompress project | 1 | 2 | Application | 
| Archiver project | 1 | 2 | Application | 
| Sharpziplib project | 1 | 4 | Application | 
| Quazip project | 1 | 1 | Application | 
| Omron | 18 | 108 | Application | 
| Rubyonrails | 14 | 226 | Application | 
| Lica | 1 | 1 | Operating System | 
| Kame | 3 | 8 | Application | 
| Netbsd | 2 | 177 | Operating System | 
| Gnupg | 4 | 55 | Application | 
| Kinagacms project | 1 | 1 | Application | 
| Nortel | 36 | 81 | Application | 
| Pluxml | 1 | 16 | Application | 
| Weban | 1 | 1 | Application | 
| Abus | 53 | 250 | Operating System | 
| Dogtagpki | 2 | 17 | Application | 
| Componentone | 3 | 4 | Application | 
| Schedmd | 1 | 24 | Application | 
| Servantix | 1 | 1 | Application |