Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Joe lumbroso acks | 1 | 1 | Application | 
| Teknopoint | 1 | 1 | Application | 
| Netcf project | 1 | 1 | Application | 
| Uniwill | 1 | 1 | Application | 
| Htmlsanitizer project | 1 | 2 | Application | 
| Idcos | 1 | 1 | Application | 
| Pondol carousel project | 1 | 1 | Application | 
| Prettybook | 1 | 1 | Application | 
| Freeipa | 1 | 21 | Application | 
| Greenshiftwp | 1 | 15 | Application | 
| Bluemark | 1 | 3 | Hardware | 
| Sciurus | 1 | 1 | Application | 
| Stonetrip | 2 | 2 | Application | 
| Lightning network daemon project | 1 | 5 | Application | 
| Notetoservices | 1 | 1 | Application | 
| Smb project | 1 | 1 | Application | 
| Makemytrip clone project | 1 | 1 | Application | 
| Wprepublic | 1 | 1 | Application | 
| Email existence project | 1 | 1 | Application | 
| Enlight software | 1 | 1 | Application |