Technology Vendor Vulnerability Posture
            This page offers a directory of technology vendors, allowing you to explore various product
            vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
            understanding the security posture of different technology providers, helping users make informed decisions
            regarding their tech investments and cybersecurity strategies.
        
    | Vendor Name | Number of Product | Vulnerabilities | Type | 
|---|---|---|---|
| Keypair project | 1 | 1 | Application | 
| Bg guestbook | 1 | 1 | Application | 
| Onnx | 1 | 1 | Application | 
| Japan radio | 2 | 4 | Hardware | 
| Gotenna | 1 | 9 | Hardware | 
| Thinkinai | 1 | 2 | Application | 
| Blogator script | 1 | 2 | Application | 
| Myspotcam | 2 | 4 | Operating System | 
| Douzone | 2 | 3 | Application | 
| Ebewe | 1 | 1 | Application | 
| Python openid connect project | 1 | 1 | Application | 
| E topbiz | 11 | 12 | Application | 
| Axis | 469 | 2904 | Hardware | 
| Upaytoken project | 1 | 1 | Application | 
| Xtuple | 1 | 1 | Application | 
| School file management system project | 1 | 2 | Application | 
| Thenewsletterplugin | 1 | 12 | Application | 
| Aurigma | 1 | 3 | Application | 
| Schroepl | 1 | 1 | Application | 
| Ksign | 1 | 1 | Application | 
 
                         
                         
                         
                                             
                                            