Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Car rental system project | 1 | 1 | Application | 
| Polycom | 86 | 140 | Hardware | 
| Assaabloy | 6 | 6 | Operating System | 
| Juniper project | 1 | 1 | Application | 
| Bootstrap site alert project | 2 | 2 | Application | 
| Spritesoftware | 2 | 2 | Application | 
| Cpg nuke | 2 | 5 | Application | 
| Shadan kun | 1 | 1 | Application | 
| The isle evrima project | 1 | 1 | Application | 
| Bytedeco | 1 | 1 | Application | 
| Jsbroks | 1 | 1 | Application | 
| Instant web mail | 1 | 1 | Application | 
| Maiwei safety production control platform project | 1 | 3 | Application | 
| Spirent | 1 | 1 | Hardware | 
| Hima | 13 | 26 | Hardware | 
| Ave | 6 | 18 | Hardware | 
| Rfactor | 1 | 2 | Application | 
| Easytimestudio | 1 | 2 | Application | 
| Rasputinonline | 1 | 1 | Application | 
| Ipages flipbook project | 1 | 3 | Application |