Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Ininet solutions | 1 | 4 | Application | 
| Hilscher | 2 | 2 | Hardware | 
| Jenkins ci | 4 | 5 | Application | 
| Sematell | 1 | 3 | Application | 
| Md jakir hosen | 1 | 1 | Application | 
| Acme sh project | 1 | 2 | Application | 
| Mike spice | 4 | 4 | Application | 
| Net activity viewer | 1 | 1 | Application | 
| Narou project | 1 | 1 | Application | 
| Hongdian | 2 | 14 | Hardware | 
| Plesk | 4 | 12 | Application | 
| Crowbar project | 1 | 1 | Application | 
| Mypresta | 5 | 5 | Application | 
| Systemk corp | 3 | 3 | Operating System | 
| Mageia | 1 | 22 | Operating System | 
| Charity donation script project | 1 | 1 | Application | 
| Netfunkdesign | 1 | 1 | Application | 
| Swiperjs | 1 | 4 | Application | 
| Link optimizer lite project | 1 | 1 | Application | 
| Keymetric | 1 | 1 | Application |