Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Tesseract project | 1 | 2 | Application | 
| Squarepiginteractive | 1 | 1 | Application | 
| Apng2gif project | 1 | 3 | Application | 
| Eslint utils project | 1 | 1 | Application | 
| Dji | 13 | 13 | Hardware | 
| Tufat | 6 | 8 | Application | 
| Php director | 1 | 2 | Application | 
| Aescrypt | 1 | 1 | Application | 
| Sds project | 1 | 2 | Application | 
| Wptimecapsule | 1 | 1 | Application | 
| Elfden | 1 | 2 | Application | 
| Ikst project | 1 | 1 | Application | 
| Panasonic | 9 | 29 | Application | 
| Asosegitim | 2 | 2 | Application | 
| Yeelink | 1 | 1 | Application | 
| Java websocket project | 1 | 1 | Application | 
| Cybelesoft | 4 | 13 | Application | 
| Virusbuster | 2 | 6 | Application | 
| Deltathree | 1 | 1 | Application | 
| Syncpool project | 1 | 1 | Application |