Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Blurams | 1 | 2 | Hardware | 
| Hirewebxperts | 1 | 3 | Application | 
| Themepunch | 3 | 20 | Application | 
| Creapark | 1 | 1 | Application | 
| Traveloka | 1 | 1 | Application | 
| Portfoliocms project | 1 | 6 | Application | 
| Js data | 1 | 2 | Application | 
| Aeotec | 1 | 2 | Operating System | 
| Hhg multistore | 1 | 5 | Application | 
| Iucode tool project | 1 | 1 | Application | 
| Azexo | 1 | 4 | Application | 
| Fujifilm | 286 | 341 | Operating System | 
| Jolt | 1 | 1 | Application | 
| Fxc | 10 | 12 | Hardware | 
| Site assistant | 1 | 1 | Application | 
| Wellieat project | 1 | 1 | Application | 
| Upredsun | 3 | 7 | Application | 
| Sciencelogic | 1 | 27 | Application | 
| Registeredassistant project | 1 | 1 | Application | 
| Thimpress | 6 | 82 | Application |