Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Whoops project | 1 | 1 | Application | 
| Besttem network marketing project | 1 | 1 | Application | 
| Mercurial | 1 | 19 | Application | 
| Petroleum management software application project | 1 | 1 | Application | 
| Python ldap | 1 | 1 | Application | 
| Ton masterserver project | 1 | 1 | Application | 
| Got project | 1 | 1 | Application | 
| Grocy project | 1 | 11 | Application | 
| Verint | 7 | 14 | Application | 
| App1pro | 1 | 1 | Application | 
| Opencast | 1 | 1 | Application | 
| Didiglobal | 2 | 2 | Application | 
| Web feet | 1 | 1 | Application | 
| Supcon | 1 | 2 | Application | 
| Qacctv | 2 | 3 | Operating System | 
| Phpcaptcha | 1 | 1 | Application | 
| Proxy py project | 1 | 1 | Application | 
| Infinitietech | 1 | 1 | Application | 
| Symphony project | 1 | 2 | Application | 
| Medicalexpo | 1 | 1 | Application |