Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Skaut bazar project | 1 | 1 | Application | 
| Plus technologies | 1 | 3 | Application | 
| The extensible catalog drupal toolkit project | 1 | 1 | Application | 
| Confinit project | 1 | 1 | Application | 
| Socket | 5 | 11 | Application | 
| Aspticker | 1 | 1 | Application | 
| X doom | 1 | 2 | Application | 
| Pixaria | 1 | 3 | Application | 
| Future nuke | 1 | 1 | Application | 
| Screaming media | 1 | 1 | Application | 
| Checksec | 1 | 2 | Application | 
| Cjg explorer pro | 1 | 2 | Application | 
| Boofcv | 1 | 1 | Application | 
| Phoenixbroadband | 1 | 1 | Operating System | 
| Poptop | 1 | 3 | Application | 
| Hongcms project | 1 | 20 | Application | 
| Frederik vermeulen | 1 | 1 | Application | 
| Jquery cookie project | 1 | 1 | Application | 
| Exxxxxxxxxxx project | 1 | 1 | Application | 
| Csm server project | 1 | 1 | Application |